WorldWideScience

Sample records for definitions word attack

  1. Self reference in word definitions

    CERN Document Server

    Levary, David; Moses, Elisha; Tlusty, Tsvi

    2011-01-01

    Dictionaries are inherently circular in nature. A given word is linked to a set of alternative words (the definition) which in turn point to further descendants. Iterating through definitions in this way, one typically finds that definitions loop back upon themselves. The graph formed by such definitional relations is our object of study. By eliminating those links which are not in loops, we arrive at a core subgraph of highly connected nodes. We observe that definitional loops are conveniently classified by length, with longer loops usually emerging from semantic misinterpretation. By breaking the long loops in the graph of the dictionary, we arrive at a set of disconnected clusters. We find that the words in these clusters constitute semantic units, and moreover tend to have been introduced into the English language at similar times, suggesting a possible mechanism for language evolution.

  2. Adjective Definitions and the Influence of Word Frequency

    Science.gov (United States)

    Marinellie, Sally A.; Johnson, Cynthia J.

    2003-01-01

    The present investigation is a study of the development of adjective definitions given by participants in Grades 6 and 10 and by young adults, as well as the influence of word frequency on those definitions. A total of 150 participants (50 per age group) wrote definitions for 6 high-frequency and 6 low-frequency adjectives. Adjective definitions…

  3. Oral Definitions of Newly Learned Words: An Error Analysis

    Science.gov (United States)

    Steele, Sara C.

    2012-01-01

    This study examined and compared patterns of errors in the oral definitions of newly learned words. Fifteen 9- to 11-year-old children with language learning disability (LLD) and 15 typically developing age-matched peers inferred the meanings of 20 nonsense words from four novel reading passages. After reading, children provided oral definitions…

  4. Estimating verbal intelligence in unipolar depression: comparison of word definition and word recognition.

    Science.gov (United States)

    Suslow, Thomas

    2009-01-01

    Depression is known to be associated with deficits in effortful processing and word fluency. Automatic processes, instead, appear largely intact in depressed patients. It was investigated whether active word definition could be a less appropriate method than passive word recognition as a measure of verbal intelligence in depression. The valid assessment of premorbid IQ is important for correct comparison with current cognitive efficiency of depressed individuals, since premorbid IQ serves as baseline or control parameter to estimate the extent and severity of acquired cognitive impairments, both in the clinical and the research context. Two vocabulary tests were administered to 90 patients (31 women) with unipolar depression and 30 control subjects (15 women): a word definition task [the vocabulary subtest of the Wechsler Adult Intelligence Scale (WAIS-R)] and a word recognition task [the Multiple choice vocabulary test (MWT)]. In the depressed sample, scores of the MWT tended to be higher than WAIS-R scores. For depressed women, the MWT score was significantly higher than the WAIS-R score. In the control sample, no differences between MWT and WAIS-R scores were observed. Our findings indicate that word definition tasks could underestimate verbal intelligence especially in depressed women. For depressed women, it could be more appropriate to administer word recognition than word definition as an estimate of premorbid or verbal intelligence.

  5. Words Mean Things: The Case for Information System Attack and Control System Attack

    Science.gov (United States)

    2008-10-31

    databases , reservation system, documents, web pages…”ix On the other hand, infrastructure control systems interact with the physical world, and...Week and Space Technology, 4 September 2002, 3, EBSCOhost (accessed 8 September 2008). xxvii Barnes, Julian E., “Hacking Could Become Weapon in...September 2002, EBSCOhost (accessed 8 September 2008). Gibson, Tim, “What You Should Know About Attacking Computer Networks

  6. Abstract Word Definition in Patients with Amnestic Mild Cognitive Impairment

    Directory of Open Access Journals (Sweden)

    Soo Ryon Kim

    2015-01-01

    Full Text Available The aims of this study were to investigate concrete and abstract word definition ability (1 between patients with amnestic mild cognitive impairment (aMCI and normal adults and (2 between the aMCI subtypes (i.e., amnestic single-domain MCI and amnestic multidomain MCI; asMCI and amMCI and normal controls. The 68 patients with aMCI (29 asMCI and 39 amMCI and 93 age- and education-matched normal adults performed word definition tasks composed of five concrete (e.g., train and five abstract nouns (e.g., jealousy. Task performances were analyzed on total score, number of core meanings, and number of supplementary meanings. The results were as follows. First, the aMCI patients scored significantly poorer than the normal controls in only abstract word definition. Second, both subtypes of aMCI performed worse than the controls in only abstract word definition. In conclusion, a definition task of abstract rather than concrete concepts may provide richer information to show semantic impairment of aMCI.

  7. The word Сriminology: a philology and a definition

    Directory of Open Access Journals (Sweden)

    Jeffrey R. Wilson

    2016-09-01

    Full Text Available Objective to formulate a new definition of the word ldquocriminologyrdquo. Methods dialectic systemic analysis synthesis comparison. Results the paper presents the history and etymology of the word ldquocriminologyrdquo. Basing on the analysis the authorrsquos definition of criminology is formulated as the systematic study of crime criminals criminal law criminal justice and criminalization. Scientific novelty the author proves that criminology is usually but not necessarily academic and scientific which means that criminology can be public andor humanistic. This concept is proved by presenting some early English instances of the word ldquocriminologyrdquo which predate the attempt to theorize a field of criminology in Italy and France in the 1880s and offers some new readings of those Italian and French texts. Thephilological analyses then come into conversation with some twentiethcentury attempts to define the field and some twentyfirstcentury innovations in an effort to generate a definition of criminology that is responsive to the diversity of criminology in both its original formation and its ongoing transformations. Practical significance one advantages of the new interpretation of criminology is its inclusiveness it introduces all nonorthodox research into scientific sphere which allows new possibilities for the development of new directions views on the problem of crime theories and methods of crime prevention and reaction.

  8. Transient ischemic attacks - Definition, risk prediction and urgent management

    Directory of Open Access Journals (Sweden)

    Sylaja P

    2009-01-01

    Full Text Available Recent evidence suggests that the risk of stroke in first few months after transient ischemic attack is higher than that was previously realized. There are clinical and imaging predictors which help in risk stratifying the patients to identify the high risk group who need immediate hospitalization and urgent evaluation. Recent advances in neuroimaging have revolutionized the evaluation of these patients. Further research is required in the deciding on the optimal treatment of these patients in the acute phase.

  9. THE NEW DEFINITION AND EARLY RISK ASSESSMENT IN PATIENTSWITH TRANSIENT ISCHEMIC ATTACK

    Institute of Scientific and Technical Information of China (English)

    Qing rui Liu; Xiao kun Mi.Peng Cui; Liru Guo

    2009-01-01

    @@ The definition of transient ischemic attack(TIA) were first advanced in the 1950s and 1960s.It is an independent risk factor of stroke.About two - thirds patients with TIA will reoccur TIA or complete stroke.Topredict the risk factors of stroke after the onset of TIA may identify the prognosis of patients,so as to have an effective treatment for the high risk patients as early as possible.

  10. Context Variation and Definitions in Learning the Meanings of Words: An Instance-Based Learning Approach

    Science.gov (United States)

    Bolger, Donald J.; Balass, Michal; Landen, Eve; Perfetti, Charles A.

    2008-01-01

    This article proposes an instance-based theoretical framework to account for the influence of both contexts and definitions on learning new word meanings and reports 2 studies that examine hypotheses about learning from context. One is that variation in contexts is important for allowing core meaning features of a word to emerge. The second is…

  11. 16 CFR 23.11 - Definition and misuse of the word “diamond.”

    Science.gov (United States)

    2010-01-01

    ... GUIDES FOR THE JEWELRY, PRECIOUS METALS, AND PEWTER INDUSTRIES § 23.11 Definition and misuse of the word... to represent, directly or by implication, that industrial grade diamonds or other non-jewelry quality diamonds are of jewelry quality. (c) The following are examples of descriptions that are not...

  12. 31 CFR 306.2 - Definitions of words and terms as used in these regulations.

    Science.gov (United States)

    2010-07-01

    ... Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT... attached. (c) Bureau refers to the Bureau of the Public Debt, Division of Customer Service, Parkersburg, WV... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Definitions of words and terms...

  13. Definiteness strategies and word order in existential-locatives and locatives in Late and Vulgar Latin

    Directory of Open Access Journals (Sweden)

    Concepción Cabrillana

    2007-12-01

    Full Text Available § 1.The parameters which began to undergo a profound change in Late Latin include the marking  of definiteness  and the gradual fixation of a different word  order.1  These two phenomena  are brought  into connection by M.. Durante's observation  (1981, 62 that article development2 is one of the main agents involved3 in the emergence of a fixed order of constituents.   § 2. The two parameters are still subject to investigation. The discussion of definite­ ness markers focuses on how and when precisely the article appeared, but it has yielded contradictory conclusions: while some scholars acknowledge the existence of articles in Late and Vulgar Latin texts, such as Egeria's Peregrinatio,4 others deny it.5 Inaddition, there are some less extreme views arguing for an intermediate stage in the long evolution from demonstratives to articles in Late Latin texts.6 The research on word order, especially in Late Latin, frequently focuses on the posi­ tion of the elements considered basic in the language;7 thus, generally speaking, almost everyone is agreed on the SOV > SV08 change, although an alternation of the two orders can be established for the Classical as well as for the Late period ([S]OV/[S]V0.9   § 3. With regard to Late and Vulgar Latin, however, there are only a few specialised papers dealing with potential historical changes in the position of the verbs which present special difficulties in the language, not only with their complex semantic content but also with their ability to form multiple constructions. 10 This is the case with the verb sum in structures expressing a semantic notion of location. The relationship between word order and definiteness in these structures has been examined by scholars attempting ing to explain the difference between the so-called 'locative' constructions (Loe and 'existential-locatives' (ExL, 11 both containing the verb sum: while the former typically front the location-encoding term (pwith a

  14. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  15. Decontextualized Language Production in Two Languages: An Investigation of Children's Word Definition Skills in Korean and English

    Science.gov (United States)

    Kang, Jennifer Yusun

    2013-01-01

    This study aimed to identify factors that contribute to bilingual children's decontextualized language production and investigate how schooling experience and bilingualism affect the development of this skill. The word definition skills of seventy Korean-English bilingual children whose first language was Korean, yet who had been schooled in…

  16. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  17. Words, words, words!

    Science.gov (United States)

    2015-09-01

    Words matter. They are the "atoms" of written and oral communication. Students rely on words in textbooks and other instructional resources and in classroom lectures and discussions. As instructors, there are times when we need to think carefully about the words we use. Sometimes there are problems that may not be initially apparent and we may introduce confusion when we were aiming for clarity.

  18. Review and comparison of content growth in word definition of Persian speaking children with 4.5 to 7.5 years of age

    Directory of Open Access Journals (Sweden)

    Maryam Malekian

    2014-10-01

    Full Text Available Background and Aim: Word definition is one of the complicated language skills that require education and linguistic awareness. In this study , comparison was made in word definition ability of children between ages of 4.5 to 7.5 years.Methods: This study was cross-sectional and descriptive-analytical in nature . Participants included 107 girls and boys who where in age group 1 (54-65 months, age group 2 (66-77 months, and age group 3 (78-90 months. They were selected by multistage sampling method and recruited from nurseries and primary schools in 1, 7, and 17 municipal districts of Tehran . Word definition task was performed on each subject. The reliability was assessed by two independent values and the validity was determined by the content. Kruskal- Wallis and Mann-Whitney U statistical methods were used for analysis.Results: Mean score of the content in word definition was significantly increased by age (p=0.001. In the second and third age groups there was no significant difference in the content of word definition. The most response that used in all ages was the functional response. With increasing age, error rate (p=0.002 and identical (p=0.003 responses significantly decreased; however, percentage use of combination II (p<0.001 responses significantly increased.Conclusion: By increasing age, quality of definitions in terms of content is improved and definitions change from functional and concrete responses to c ombination II definitions.

  19. Effects of focus and definiteness on children's word order: evidence from German five-year-olds' reproductions of double object constructions.

    Science.gov (United States)

    Höhle, Barbara; Hörnig, Robin; Weskott, Thomas; Knauf, Selene; Krüger, Agnes

    2014-07-01

    Two experiments tested how faithfully German children aged 4 ;5 to 5 ;6 reproduce ditransitive sentences that are unmarked or marked with respect to word order and focus (Exp1) or definiteness (Exp2). Adopting an optimality theory (OT) approach, it is assumed that in the German adult grammar word order is ranked lower than focus and definiteness. Faithfulness of children's reproductions decreased as markedness of inputs increased; unmarked structures were reproduced most faithfully and unfaithful outputs had most often an unmarked form. Consistent with the OT proposal, children were more tolerant against inputs marked for word order than for focus; in conflict with the proposal, children were less tolerant against inputs marked for word order than for definiteness. Our results suggest that the linearization of objects in German double object constructions is affected by focus and definiteness, but that prosodic principles may have an impact on the position of a focused constituent.

  20. Using an iTouch to Teach Core Curriculum Words and Definitions: Efficacy and Social Validity

    Science.gov (United States)

    Jameson, J. Matt; Thompson, Victoria; Manuele, Greg; Smith, Diane; Egan, Hannah; Moore, Tiffany

    2012-01-01

    Media scholars have long recognized the interaction between the medium that conveys the information and the information that is conveyed. This study examined the relative impact of different low- and high-tech instructional mediums (e.g., flashcards and the iTouch) on the acquisition of general education content-referenced sight words and…

  1. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  2. Cancer patients' attitudes toward euthanasia and physician-assisted suicide: the influence of question wording and patients' own definitions on responses.

    Science.gov (United States)

    Parkinson, Lynne; Rainbird, Katherine; Kerridge, Ian; Carter, Gregory; Cavenagh, John; McPhee, John; Ravenscroft, Peter

    2005-01-01

    The aims of this study were to: (1) investigate patients' views on euthanasia and physician-assisted suicide (PAS), and (2) examine the impact of question wording and patients' own definitions on their responses. Cross-sectional survey of consecutive patients with cancer. Newcastle (Australia) Mater Hospital Outpatients Clinic. Patients over 18 years of age, attending the clinic for follow-up consultation or treatment by a medical oncologist, radiation oncologist or haematologist. Face-to-face patient interviews were conducted examining attitudes to euthanasia and PAS. 236 patients with cancer (24% participation rate; 87% consent rate) were interviewed. Though the majority of participants supported the idea of euthanasia, patient views varied significantly according to question wording and their own understanding of the definition of euthanasia. Researchers need to be circumspect about framing and interpreting questions about support of 'euthanasia', as the term can mean different things to different people, and response may depend upon the specifics of the question asked.

  3. A New Exploration on the Definition of Modern Chinese Word%关于现代汉语词的定义新探

    Institute of Scientific and Technical Information of China (English)

    李敏

    2015-01-01

    “Word”is one of the basic units of language;the definition of word is the common concern for both the linguists and the linguistic philosophers. For the definition of modern Chinese word, it still presents a contending situation. From the perspective of concept and meaning, the word is considered as the representative form of the concept of human ideology;modern Chinese word is the minimalist language unit that the modern Chinese community conventionally apply to represent the concept lied in their mind.%词是语言的基本单位之一,“词”的定义问题一直都是语言学与语言哲学界共同关注的问题。对于现代汉语中词的定义,至今仍然呈现出百家争鸣的局面。从概念和意义的视角出发,词是对普遍存在于人类思想意识中的某个单一整体概念的语言再现形式,而现代汉语中的词则是现代汉语这一语言社区中的汉语使用者约定用于再现单一完整概念的最小的语言单位。

  4. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  5. The evolution of the definition of transient ischemic attack%短暂性脑缺血发作定义的演变

    Institute of Scientific and Technical Information of China (English)

    曹勇军; 肖国栋; 章春园; 刘春风

    2009-01-01

    In recent years, here are many new understandings in the definition, etiology, diagnosis and treatment of transient ischemic attack (TLA).The latest viewpoint considers that TIA is a transient episode of neurological dysfunction caused by brain, spinal cord or focal retinal ischemia, without the evidence of acute infarction. The duration of TIA is no longer the key factor, whether the existence of infarction or not is the key factor in the differentiation of TIA and ischemic stroke. Therefore ,it should emphasize the importance of neuroimaging in the diagnosis of TIA. As a neurological emergency, the risk level of TIA should be stratified and evaluated, and the active interventions should be performed.%近年来,对短暂性脑缺血发作(transient ischemic attack,TIA)的定义、病因、诊断和治疗有了许多新的认识.最新的观点认为,TIA是由脑、脊髓或视网膜局灶性缺血引起的短暂性神经功能障碍,且无急性脑梗死证据.症状持续时间不再是关键,是否存在梗死才是区别TIA与缺血性卒中的关键,因此强调神经影像学在TIA诊断方面的重要性.TIA作为一种神经科急症,要求对其危险程度进行分层评价,并进行积极干预.

  6. 简论词的语文义与百科义%A Brief Introduction to the Language Definitions and Significance of Encyclopedia of the Word

    Institute of Scientific and Technical Information of China (English)

    汤丽丽

    2011-01-01

    词语的释义可分为语文义、百科义两类。两者之间既有联系,又有区别,在一定条件下,还可以互相转化。区分这两种释义,对于词典编纂、语言规范、语文教学都有重要意义。%The explanation of the words can be divided into two categories, which are language definitions and significance of encyclopedia. Both connections and differences exist between the two kinds of definitions. Under certain conditions, they can be transformed into each other. Distinguish the differences between these two definitions plays an important role in lexicography, language specification and Chinese teaching.

  7. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  9. Essential words for the TOEFL

    CERN Document Server

    Matthiesen, Steven J

    2017-01-01

    This revised book is specifically designed for ESL students preparing to take the TOEFL. Includes new words and phrases, a section on purpose words, a list of vocabulary words with definitions, sample sentences, practice exercises for 500 need-to-know words, practice test with answer key, and more.

  10. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  11. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  12. Some words on Word

    NARCIS (Netherlands)

    Janssen, Maarten; Visser, A.

    2008-01-01

    In many disciplines, the notion of a word is of central importance. For instance, morphology studies le mot comme tel, pris isol´ement (Mel’ˇcuk, 1993 [74]). In the philosophy of language the word was often considered to be the primary bearer of meaning. Lexicography has as its fundamental role to c

  13. The Effects of Learning from Word Pairs on Word Knowledge

    Directory of Open Access Journals (Sweden)

    Shamsudin Sarimah

    2015-01-01

    Full Text Available Vocabulary plays an essential role in language learning. The lack of vocabulary might cause incompetency to language users. It is therefore very important for language instructors to find suitable ways of teaching vocabulary since learning vocabulary consists of learning various aspects of word knowledge. These aspects include orthography, meaning and form, collocation, association and grammatical functions. There are various methods that could be used in gaining aspects of word knowledge. The purpose of this study is to investigate to what extent are aspects of word knowledge gained by learning from word pairs. 120 secondary school students were divided into four groups of thirty students. The first group was given a set of Malay Translation, the second, English Translation, the third, Malay Definition and the fourth, English Definition word pair to learn followed by word knowledge tests. The results show that all word pairs promote large gains in learning aspects of word knowledge. The scores between the groups were also compared and it was found that the mean score of the Malay Definition word pair group is the highest, followed by the Malay Translation word pair group, the English Translation word pair group, and English Definition word pair group.

  14. Signal Words

    Science.gov (United States)

    SIGNAL WORDS TOPIC FACT SHEET NPIC fact sheets are designed to answer questions that are commonly asked by the ... making decisions about pesticide use. What are Signal Words? Signal words are found on pesticide product labels, ...

  15. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  16. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  17. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  18. 1001 most useful French words

    CERN Document Server

    McCoy, Heather

    2012-01-01

    Up-to-date entries cover technology terms, and sections on vocabulary and grammar offer helpful tips. Each word is accompanied by a brief definition, a sentence demonstrating proper usage, and a translation.

  19. 1001 most useful French words

    CERN Document Server

    Buxbaum, Marcella Ottolenghi

    2001-01-01

    This practical, inexpensive volume features over 1,000 common French words, each accompanied by a French sentence demonstrating proper usage. Also included are definitions arranged by such categories as family, food, numbers, and more. (These words are not repeated in the alphabetical section.) A page of Vocabulary Tips explains how to easily recognize hundreds of French/English cognates.

  20. WORD MAGIC

    Institute of Scientific and Technical Information of China (English)

    Zhao; Xinmin

    1999-01-01

    This article presents a word game named"Word Magic",which is effective and efficient inavoiding word forgetting & decaying as well as helping students to improve their abilities in spelling,word building and so on.The procedures and rules of the game are formulated together with the makingof the cards used in it.The advantages of the game are also expounded.

  1. Prevalence, Incidence, Prognosis, Early Stroke Risk, and Stroke-Related Prognostic Factors of Definite or Probable Transient Ischemic Attacks in China, 2013

    Directory of Open Access Journals (Sweden)

    Bin Jiang

    2017-06-01

    Full Text Available The epidemiological characteristics of transient ischemic attacks (TIAs in China are unclear. In 2013, we conducted a nationally representative, door-to-door epidemiological survey on TIA in China using a complex, multistage, probability sampling design. Results showed that the weighted prevalence of TIA in China was 103.3 [95% confidence interval (CI: 83.9–127.2] per 100,000 in the population, 92.4 (75.0–113.8 per 100,000 among men, and 114.7 (87.2–151.0 per 100,000 among women. The weighted incidence of TIA was 23.9 (17.8–32.0 per 100,000 in the population, 21.3 (14.3–31.5 per 100,000 among men, and 26.6 (17.0–41.7 per 100,000 among women. No difference in average prognosis was found between TIA and stroke in the population. Weighted risk of stroke among TIA patients was 9.7% (6.5–14.3%, 11.1% (7.5–16.1%, and 12.3% (8.4–17.7% at 2, 30, and 90 days, respectively. The risk of stroke was higher among male patients with a history of TIA than among female patients with a history of TIA (OR: 2.469; 95% CI: 1.172–5.201; P = 0.018, and higher among TIA patients with hypertension than among TIA patients without hypertension (OR: 2.671; 1.547–4.613; P < 0.001. It can be concluded that there are an estimated 1.35 million TIA patients nationwide, with 0.31 million new cases of TIA annually in China. TIA patients were not better managed prior to a stroke event. Early risk of stroke among TIA patients is high. Sex and hypertension may be stroke-associated prognostic factors among TIA patients. TIA clinics and surveillance should be integrated into the national health-care system.

  2. Word classes

    DEFF Research Database (Denmark)

    Rijkhoff, Jan

    2007-01-01

    This article provides an overview of recent literature and research on word classes, focusing in particular on typological approaches to word classification. The cross-linguistic classification of word class systems (or parts-of-speech systems) presented in this article is based on statements found...... a parts-of-speech system that includes the categories Verb, Noun, Adjective and Adverb, other languages may use only a subset of these four lexical categories. Furthermore, quite a few languages have a major word class whose members cannot be classified in terms of the categories Verb – Noun – Adjective...

  3. Word form Encoding in Chinese Word Naming and Word Typing

    Science.gov (United States)

    Chen, Jenn-Yeu; Li, Cheng-Yi

    2011-01-01

    The process of word form encoding was investigated in primed word naming and word typing with Chinese monosyllabic words. The target words shared or did not share the onset consonants with the prime words. The stimulus onset asynchrony (SOA) was 100 ms or 300 ms. Typing required the participants to enter the phonetic letters of the target word,…

  4. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  7. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  8. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  9. "What do you think of when I say the word 'snack'?" Towards a cohesive definition among low-income caregivers of preschool-age children.

    Science.gov (United States)

    Younginer, Nicholas A; Blake, Christine E; Davison, Kirsten K; Blaine, Rachel E; Ganter, Claudia; Orloski, Alexandria; Fisher, Jennifer Orlet

    2016-03-01

    Despite agreement that snacks contribute significant energy to children's diets, evidence of the effects of snacks on health, especially in children, is weak. Some of the lack of consistent evidence may be due to a non-standardized definition of snacks. Understanding how caregivers of preschool-aged children conceptualize and define child snacks could provide valuable insights on epidemiological findings, targets for anticipatory guidance, and prevention efforts. Participants were 59 ethnically-diverse (White, Hispanic, and African American), low-income urban caregivers of children age 3-5 years. Each caregiver completed a 60-90 min semi-structured in-depth interview to elicit their definitions of child snacks. Data were coded by two trained coders using theoretically-guided emergent coding techniques to derive key dimensions of caregivers' child snack definitions. Five interrelated dimensions of a child snack definition were identified: (1) types of food, (2) portion size, (3) time, (4) location, and (5) purpose. Based on these dimensions, an empirically-derived definition of caregivers' perceptions of child snacks is offered: A small portion of food that is given in-between meals, frequently with an intention of reducing or preventing hunger until the next mealtime. These findings suggest interrelated dimensions that capture the types of foods and eating episodes that are defined as snacks. Child nutrition studies and interventions that include a focus on child snacks should consider using an a priori multi-dimensional definition of child snacks.

  10. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  11. Individual,Education,Words and Deeds of Morality Definition%论道德定义的个体性、教育性、言行性

    Institute of Scientific and Technical Information of China (English)

    周武军

    2012-01-01

    The subject that moral should undertake is individual,and education should be a way to adjust moral.The object of moral evaluation is not only the behavior,but also includes the words,or "words and deeds" evaluation.The concept of morality can be redefined.Morality takes virtues and vices as a standard,is a combination of non-power norms of words and deeds,and is used to coordinate one's body and mind,the relationships and interests between individual and others and relationship between individual and nature.Morality sustains the adjustment by education,customs,social public opinion and individual inner belief.%道德承担的主体是个人的;教育亦应该成为道德的调节方式;道德评价的对象不仅是行为,还应包括言语,是对"言行"的评价。因此,道德的定义应是:道德以善恶为标准,是调整个人的身心、个人与他人、个人与自然之间利益关系的非权力性言行规范的总和。它以教育、风俗习惯、社会舆论和个人的内心信念来维系调节。

  12. Words semantic orientation classification based on HowNet

    Institute of Scientific and Technical Information of China (English)

    LI Dun; MA Yong-tao; GUO Jian-li

    2009-01-01

    Based on the text orientation classification, a new measurement approach to semantic orientation of words was proposed. According to the integrated and detailed definition of words in HowNet, seed sets including the words with intense orientations were built up. The orientation similarity between the seed words and the given word was then calculated using the sentiment weight priority to recognize the semantic orientation of common words. Finally, the words' semantic orientation and the context were combined to recognize the given words' orientation. The experiments show that the measurement approach achieves better results for common words' orientation classification and contributes particularly to the text orientation classification of large granularities.

  13. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  14. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  15. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  16. Periodic words connected with the Fibonacci words

    Directory of Open Access Journals (Sweden)

    G. M. Barabash

    2016-06-01

    Full Text Available In this paper we introduce two families of periodic words (FLP-words of type 1 and FLP-words of type 2 that are connected with the Fibonacci words and investigated their properties.

  17. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  18. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  19. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  1. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Word prediction

    Energy Technology Data Exchange (ETDEWEB)

    Rumelhart, D.E.; Skokowski, P.G.; Martin, B.O.

    1995-05-01

    In this project we have developed a language model based on Artificial Neural Networks (ANNs) for use in conjunction with automatic textual search or speech recognition systems. The model can be trained on large corpora of text to produce probability estimates that would improve the ability of systems to identify words in a sentence given partial contextual information. The model uses a gradient-descent learning procedure to develop a metric of similarity among terms in a corpus, based on context. Using lexical categories based on this metric, a network can then be trained to do serial word probability estimation. Such a metric can also be used to improve the performance of topic-based search by allowing retrieval of information that is related to desired topics even if no obvious set of key words unites all the retrieved items.

  4. Learning words

    DEFF Research Database (Denmark)

    Jaswal, Vikram K.; Hansen, Mikkel

    2006-01-01

    Children tend to infer that when a speaker uses a new label, the label refers to an unlabeled object rather than one they already know the label for. Does this inference reflect a default assumption that words are mutually exclusive? Or does it instead reflect the result of a pragmatic reasoning...... process about what the speaker intended? In two studies, we distinguish between these possibilities. Preschoolers watched as a speaker pointed toward (Study 1) or looked at (Study 2) a familiar object while requesting the referent for a new word (e.g. 'Can you give me the blicket?'). In both studies......, despite the speaker's unambiguous behavioral cue indicating an intent to refer to a familiar object, children inferred that the novel label referred to an unfamiliar object. These results suggest that children expect words to be mutually exclusive even when a speaker provides some kinds of pragmatic...

  5. 新词词典编纂视角下的英语“新词”界定%The Definition of New English Words under Lexicology

    Institute of Scientific and Technical Information of China (English)

    杨军

    2014-01-01

    本文从词典学的角度出发,结合FUDGE标准,探讨“新词”的科学界定问题。时代的快速发展给“新词”的科学界定带来了新的挑战,笔者通过将新词界定的传统方法和新方法进行比对,发现“新词”的界定不是一个单凭几条规则或原则就能解决的问题,它是一项融考据和预测性研究于一体的工作,不仅涉及“新词”的频繁性、受众性、广泛性、衍生性、延续性,而且还涉及其他诸多因素。%From the perspective of lexicology,combined with FUDGE standard,this paper discusses the scien-tific definition of“new words” .The era of rapid development brings new challenges to the“new words” scien-tific definition.Therefore,after comparing traditional standards with modern ones,the author feels that“words”definition can’ t be done by a few rules or principles,it is a integration of both textual research and predictive study.What’ s more,it involves not only Frequency of use,Unobtrusiveness,Di versity of users and situations, Generation of other forms and mea nings,Endurance of the concept,but also other factors.

  6. Learning words

    DEFF Research Database (Denmark)

    Jaswal, Vikram K.; Hansen, Mikkel

    2006-01-01

    Children tend to infer that when a speaker uses a new label, the label refers to an unlabeled object rather than one they already know the label for. Does this inference reflect a default assumption that words are mutually exclusive? Or does it instead reflect the result of a pragmatic reasoning ...

  7. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  8. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  9. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  10. Word wheels

    CERN Document Server

    Clark, Kathryn

    2013-01-01

    Targeting the specific problems learners have with language structure, these multi-sensory exercises appeal to all age groups including adults. Exercises use sight, sound and touch and are also suitable for English as an Additional Lanaguage and Basic Skills students.Word Wheels includes off-the-shelf resources including lesson plans and photocopiable worksheets, an interactive CD with practice exercises, and support material for the busy teacher or non-specialist staff, as well as homework activities.

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  19. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  20. Word Domain Disambiguation via Word Sense Disambiguation

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; Tratz, Stephen C.; Gregory, Michelle L.

    2006-06-04

    Word subject domains have been widely used to improve the perform-ance of word sense disambiguation al-gorithms. However, comparatively little effort has been devoted so far to the disambiguation of word subject do-mains. The few existing approaches have focused on the development of al-gorithms specific to word domain dis-ambiguation. In this paper we explore an alternative approach where word domain disambiguation is achieved via word sense disambiguation. Our study shows that this approach yields very strong results, suggesting that word domain disambiguation can be ad-dressed in terms of word sense disam-biguation with no need for special purpose algorithms.

  1. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  2. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  3. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  4. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  6. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  7. 9 CFR 355.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meaning of words. 355.1 Section 355.1 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... IDENTIFICATION AS TO CLASS, QUALITY, QUANTITY, AND CONDITION Definitions § 355.1 Meaning of words. Words used...

  8. 7 CFR 27.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Meaning of words. 27.1 Section 27.1 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... CLASSIFICATION UNDER COTTON FUTURES LEGISLATION Regulations Definitions § 27.1 Meaning of words. Words used...

  9. 7 CFR 97.2 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 97.2 Section 97.2 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... PLANT VARIETY AND PROTECTION Definitions § 97.2 Meaning of words. Words used in the regulations in...

  10. 9 CFR 592.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meaning of words. 592.1 Section 592.1... INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Definitions § 592.1 Meaning of words. Under the regulations in this part words in the singular shall be deemed to import the plural and vice versa, as the...

  11. 9 CFR 351.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meaning of words. 351.1 Section 351.1 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... CERTIFICATION CERTIFICATION OF TECHNICAL ANIMAL FATS FOR EXPORT Definitions § 351.1 Meaning of words. Words...

  12. 7 CFR 75.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 75.1 Section 75.1 Agriculture... AND CERTIFICATION OF QUALITY OF AGRICULTURAL AND VEGETABLE SEEDS Definitions § 75.1 Meaning of words. Words used in the regulations in this part in the singular form shall be deemed to import the plural...

  13. 7 CFR 205.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 205.1 Section 205.1 Agriculture... PROVISIONS NATIONAL ORGANIC PROGRAM Definitions § 205.1 Meaning of words. For the purpose of the regulations in this subpart, words in the singular form shall be deemed to impart the plural and vice versa,...

  14. 7 CFR 54.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 54.1 Section 54.1 Agriculture... MEAT PRODUCTS (GRADING, CERTIFICATION, AND STANDARDS) Regulations Definitions § 54.1 Meaning of words. Words used in this subpart in the singular form shall be deemed to import the plural, and vice versa,...

  15. 7 CFR 48.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Meaning of words. 48.1 Section 48.1 Agriculture... SECRETARY OF AGRICULTURE FOR THE ENFORCEMENT OF THE PRODUCE AGENCY ACT Definitions § 48.1 Meaning of words. Words in this part in the singular form shall be deemed to import the plural, and vice versa, as...

  16. 7 CFR 42.101 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Meaning of words. 42.101 Section 42.101 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... CONDITION OF FOOD CONTAINERS Definitions § 42.101 Meaning of words. Words used in this part in the...

  17. 7 CFR 43.101 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Meaning of words. 43.101 Section 43.101 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... SAMPLING PLANS Definitions § 43.101 Meaning of words. Words used in this subpart in the singular form...

  18. 7 CFR 53.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 53.1 Section 53.1 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards..., CERTIFICATION, AND STANDARDS) Regulations Definitions § 53.1 Meaning of words. Words used in this subpart in...

  19. 7 CFR 201.1 - Meaning of words.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Meaning of words. 201.1 Section 201.1 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... REGULATIONS Definitions § 201.1 Meaning of words. Words in the regulations in this part in the singular...

  20. Measuring word identification skills and related variables in Dutch children

    NARCIS (Netherlands)

    VandenBos, KP; Spelberg, HCL; Leong, CK; Joshi, RM

    1997-01-01

    In this chapter a simple definition of dyslexia is adopted: Ward identification ability below a certain performance criterion on a suitable word identification test. In Study 1, the research focus is on two word identification tests, a real-word test (RWT) and a pseudoword test (PWT). The question i

  1. Measuring word identification skills and related variables in Dutch children

    NARCIS (Netherlands)

    VandenBos, KP; Spelberg, HCL; Leong, CK; Joshi, RM

    1997-01-01

    In this chapter a simple definition of dyslexia is adopted: Ward identification ability below a certain performance criterion on a suitable word identification test. In Study 1, the research focus is on two word identification tests, a real-word test (RWT) and a pseudoword test (PWT). The question

  2. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  3. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  4. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  5. Cyber Attacks and the Legal Justification for an Armed Response

    Science.gov (United States)

    2017-05-25

    supporting 1.3 million Estonians.10 These networks controlled all aspects of life in the state including banking , ATM, telephones, personal networks...government and military communication systems, banking systems, and media outlets. The Georgia cyber attack meets the Tallinn Manual definition satisfying...international law apply to cyber attacks and can legally justify armed response. The ICJ’s judgment in Nicaragua v.United States of America and its

  6. Does the panic attack activate the hypothalamic-pituitary-adrenal axis?

    OpenAIRE

    Graeff Frederico G.; Garcia-Leal Cybele; Del-Ben Cristina M; Guimarães Francisco S.

    2005-01-01

    A bibliographic search has been performed in MEDLINE using cortisol and panic as key-words, occurring in the title and/or in the abstract. Human studies were selected, with no time limit. The following publications were excluded: reviewarticles, case reports, panic attacks in disorders other than panic disorder, and studies on changes that occurred in-between panic attacks. The results showed that real-life panic attacks as well as those induced by selective panicogenic agents such as lactate...

  7. Phase retrieval for attacking fractional Fourier transform encryption.

    Science.gov (United States)

    Kong, Dezhao; Shen, Xueju; Cao, Liangcai; Jin, Guofan

    2017-04-20

    An advanced iterative phase retrieval algorithm is applied to perform a ciphertext-only attack on the fractional Fourier transform-based double random phase encryption system. With the given complex amplitude of ciphertext and definite support of the object image, the original object image can be recovered by estimating the energy of support area in the recovered image. The encryption system can be attacked by analyzing the sensibility of fractional Fourier transform order keys and evaluating the energy of the object image support area. The proposed algorithm can obtain encrypted fractional order and retrieve two random phase keys. Numerical results demonstrate the efficacy of the proposed attacking method.

  8. Word, Words, Words: Ellul and the Mediocritization of Language

    Science.gov (United States)

    Foltz, Franz; Foltz, Frederick

    2012-01-01

    The authors explore how technique via propaganda has replaced the word with images creating a mass society and limiting the ability of people to act as individuals. They begin by looking at how words affect human society and how they have changed over time. They explore how technology has altered the meaning of words in order to create a more…

  9. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  10. Word recognition using ideal word patterns

    Science.gov (United States)

    Zhao, Sheila X.; Srihari, Sargur N.

    1994-03-01

    The word shape analysis approach to text recognition is motivated by discoveries in psychological studies of the human reading process. It attempts to describe and compare the shape of the word as a whole object without trying to segment and recognize the individual characters, so it bypasses the errors committed in character segmentation and classification. However, the large number of classes and large variation and distortion expected in all patterns belonging to the same class make it difficult for conventional, accurate, pattern recognition approaches. A word shape analysis approach using ideal word patterns to overcome the difficulty and improve recognition performance is described in this paper. A special word pattern which characterizes a word class is extracted from different sample patterns of the word class and stored in memory. Recognition of a new word pattern is achieved by comparing it with the special pattern of each word class called ideal word pattern. The process of generating the ideal word pattern of each word class is proposed. The algorithm was tested on a set of machine printed gray scale word images which included a wide range of print types and qualities.

  11. Learning word meanings: overnight integration and study modality effects.

    Directory of Open Access Journals (Sweden)

    Frauke van der Ven

    Full Text Available According to the complementary learning systems (CLS account of word learning, novel words are rapidly acquired (learning system 1, but slowly integrated into the mental lexicon (learning system 2. This two-step learning process has been shown to apply to novel word forms. In this study, we investigated whether novel word meanings are also gradually integrated after acquisition by measuring the extent to which newly learned words were able to prime semantically related words at two different time points. In addition, we investigated whether modality at study modulates this integration process. Sixty-four adult participants studied novel words together with written or spoken definitions. These words did not prime semantically related words directly following study, but did so after a 24-hour delay. This significant increase in the magnitude of the priming effect suggests that semantic integration occurs over time. Overall, words that were studied with a written definition showed larger priming effects, suggesting greater integration for the written study modality. Although the process of integration, reflected as an increase in the priming effect over time, did not significantly differ between study modalities, words studied with a written definition showed the most prominent positive effect after a 24-hour delay. Our data suggest that semantic integration requires time, and that studying in written format benefits semantic integration more than studying in spoken format. These findings are discussed in light of the CLS theory of word learning.

  12. Learning word meanings: overnight integration and study modality effects.

    Science.gov (United States)

    van der Ven, Frauke; Takashima, Atsuko; Segers, Eliane; Verhoeven, Ludo

    2015-01-01

    According to the complementary learning systems (CLS) account of word learning, novel words are rapidly acquired (learning system 1), but slowly integrated into the mental lexicon (learning system 2). This two-step learning process has been shown to apply to novel word forms. In this study, we investigated whether novel word meanings are also gradually integrated after acquisition by measuring the extent to which newly learned words were able to prime semantically related words at two different time points. In addition, we investigated whether modality at study modulates this integration process. Sixty-four adult participants studied novel words together with written or spoken definitions. These words did not prime semantically related words directly following study, but did so after a 24-hour delay. This significant increase in the magnitude of the priming effect suggests that semantic integration occurs over time. Overall, words that were studied with a written definition showed larger priming effects, suggesting greater integration for the written study modality. Although the process of integration, reflected as an increase in the priming effect over time, did not significantly differ between study modalities, words studied with a written definition showed the most prominent positive effect after a 24-hour delay. Our data suggest that semantic integration requires time, and that studying in written format benefits semantic integration more than studying in spoken format. These findings are discussed in light of the CLS theory of word learning.

  13. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  14. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  15. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  16. 2,001 most useful French words

    CERN Document Server

    McCoy, Heather

    2011-01-01

    The ideal travel companion and at-home reference, this volume features over 2,000 common French words, each accompanied by a brief definition, a sentence in French demonstrating proper usage, and a translation. These up-to-date terms cover twenty-first century digital technologies and consumer electronics, and a convenient reference section offers greetings and words related to directions, restaurant orders, and other everyday activities, plus helpful tips on vocabulary and grammar.

  17. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  18. 48 CFR 302.101 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Definitions. 302.101 Section 302.101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES GENERAL DEFINITIONS OF WORDS AND TERMS Definitions 302.101 Definitions. (a) Agency head or head of the Agency, unless...

  19. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  20. Taken out of Context: Differential Processing in Contextual and Isolated Word Reading

    Science.gov (United States)

    Martin-Chang, Sandra; Levesque, Kyle

    2013-01-01

    Three experiments are reported that investigate the cognitive processes underlying contextual and isolated word reading. In Phase 1, undergraduate participants were exposed to 75 target words under three conditions. The participants generated 25 words from definitions, read 25 words in context and read 25 in isolation. In Phase 2, volunteers…

  1. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  2. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  3. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  4. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  5. Cognitive impairment in transient ischemic attack patients: A systematic review

    NARCIS (Netherlands)

    Rooij, F.G. van; Kessels, R.P.C.; Richard, E.; Leeuw, H.F. de; Dijk, E.J. van

    2016-01-01

    Background: Although by definition a transient ischemic attack (TIA) lasts less than 24 h, many patients experience cognitive complaints beyond focal symptom resolution. However, their prevalence, causes and profile are unclear. We therefore performed a systematic review on cognitive impairment afte

  6. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  7. Jasper Johns' Painted Words.

    Science.gov (United States)

    Levinger, Esther

    1989-01-01

    States that the painted words in Jasper Johns' art act in two different capacities: concealed words partake in the artist's interrogation of visual perception; and visible painted words question classical representation. Argues that words are Johns' means of critiquing modernism. (RS)

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. When is a word a word?

    Science.gov (United States)

    Vihman, M M; McCune, L

    1994-10-01

    Although adult-based words co-occur in the period of transition to speech with a variety of non-word vocalizations, little attention has been given to the formidable problem of identifying these earliest words. This paper specifies explicit, maximally 'inclusive' identification procedures, with criteria based on both phonetic and contextual parameters. A formal system for evaluating phonetic match is suggested, as well as a set of child-derived functional categories reflecting use in context. Analysis of word use across two samples of 10 children each, followed from 0;9 to 1;4, provides evidence to suggest that context-bound words can be 'trained' by focusing on eliciting language, but that the timing of context-flexible word use remains independent of such training.

  10. A Few Words about Words | Poster

    Science.gov (United States)

    By Ken Michaels, Guest Writer In Shakepeare’s play “Hamlet,” Polonius inquires of the prince, “What do you read, my lord?” Not at all pleased with what he’s reading, Hamlet replies, “Words, words, words.”1 I have previously described the communication model in which a sender encodes a message and then sends it via some channel (or medium) to a receiver, who decodes the message and, ideally, understands what was sent. Surely the most common way of encoding a message is in choosing the most appropriate words for the listener or reader.

  11. A Few Words about Words | Poster

    Science.gov (United States)

    By Ken Michaels, Guest Writer In Shakepeare’s play “Hamlet,” Polonius inquires of the prince, “What do you read, my lord?” Not at all pleased with what he’s reading, Hamlet replies, “Words, words, words.”1 I have previously described the communication model in which a sender encodes a message and then sends it via some channel (or medium) to a receiver, who decodes the message and, ideally, understands what was sent. Surely the most common way of encoding a message is in choosing the most appropriate words for the listener or reader.

  12. Sharks Under Attack etc

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Because of growing demand for their fins,shark populations around the world are shrinking.Now,steps are being taken to save the fish before it's too late.Terrifying.That is the word many would use to describe sharks.But sharks have good reason to be terrified of huinans.After all,people kill as many as 73million sharks each year.The animal's fins are prized in many parts of the world.They arc the key ingredient of shark-fin soup,which is an Asian delicacy.

  13. Concurrency Attacks and Defenses

    Science.gov (United States)

    2016-10-04

    Administration, Morningside 615 West 131st Street, Room 254, Mail Code 8725 New York, NY 10027-7922 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING...on desktops (e.g., word processing), are now served from distributed “clouds” of servers to meet the current computing demands for high scalability...Document - Text Analysis Report Document - Text Analysis Appendix Documents 2. Thank You E- mail user Sep 28, 2016 18:09:13 Success: Email Sent to: junfeng@cs.columbia.edu

  14. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  15. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  16. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  17. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  18. Word Geology – its Roots and Meanings

    Directory of Open Access Journals (Sweden)

    Mihael Brenčič

    2011-12-01

    Full Text Available In the period up to 18th century the meaning of the word geology has substantially changed; from Latin word geologia written by de Bury in the 14th century, through the use of word giologia by Aldrovandi in the beginning of 17th century and to near final definition of word geology that appeared in French Encyclopaedia from 1751.With the help of Internet some other early works not known to the literature of geology history were discovered.Among them are German books where in the title word geology is also present. Works of Zaharius Grapo, JoannesSchnabel and Johann Gregorii can be listed. Short analysis of other German geological works from the second half of the 18th century important for Slovenian territory are briefly presented. Starting from the database of earlier Slovenian publications available on the Internet an analysis of word geology early appearances in Slovene language is presented. First publication of the word root geol- appeared in newspaper Slovenija in year 1849. Amongearly authors Davorin Trstenjak was first using geological information starting in year 1853. Earliest longer textpresented information on geological work in Slovene language was published in the newspaper Novice in year 1853. Based on the available literature and other sources reinterpretation of the meaning of word geology is based in the context of its role in the natural sciences development as well as its historical context.

  19. Word 2013 for dummies

    CERN Document Server

    Gookin, Dan

    2013-01-01

    This bestselling guide to Microsoft Word is the first and last word on Word 2013 It's a whole new Word, so jump right into this book and learn how to make the most of it. Bestselling For Dummies author Dan Gookin puts his usual fun and friendly candor back to work to show you how to navigate the new features of Word 2013. Completely in tune with the needs of the beginning user, Gookin explains how to use Word 2013 quickly and efficiently so that you can spend more time working on your projects and less time trying to figure it all out. Walks you through the capabilit

  20. Professional WordPress

    CERN Document Server

    Stern, Hal; Williams, Brad

    2010-01-01

    An in-depth look at the internals of the WordPress system.As the most popular blogging and content management platform available today, WordPress is a powerful tool. This exciting book goes beyond the basics and delves into the heart of the WordPress system, offering overviews of the functional aspects of WordPress as well as plug-in and theme development. What is covered in this book?: WordPress as a Content Management System; Hosting Options; Installing WordPress Files; Database Configuration; Dashboard Widgets; Customizing the Dashboard; Creating and Managing Content; Categorizing Your Cont

  1. Combinatorics on words Christoffel words and repetitions in words

    CERN Document Server

    Berstel, Jean; Reutenauer, Christophe; Saliola, Franco V

    2008-01-01

    The two parts of this text are based on two series of lectures delivered by Jean Berstel and Christophe Reutenauer in March 2007 at the Centre de Recherches Mathématiques, Montréal, Canada. Part I represents the first modern and comprehensive exposition of the theory of Christoffel words. Part II presents numerous combinatorial and algorithmic aspects of repetition-free words stemming from the work of Axel Thue-a pioneer in the theory of combinatorics on words. A beginner to the theory of combinatorics on words will be motivated by the numerous examples, and the large variety of exercises, which make the book unique at this level of exposition. The clean and streamlined exposition and the extensive bibliography will also be appreciated. After reading this book, beginners should be ready to read modern research papers in this rapidly growing field and contribute their own research to its development. Experienced readers will be interested in the finitary approach to Sturmian words that Christoffel words offe...

  2. Hierarchies in Dictionary Definition Space

    CERN Document Server

    Picard, Olivier; Harnad, Stevan; Marcotte, Odile; Chicoisne, Guillaume; Gargouri, Yassine

    2009-01-01

    A dictionary defines words in terms of other words. Definitions can tell you the meanings of words you don't know, but only if you know the meanings of the defining words. How many words do you need to know (and which ones) in order to be able to learn all the rest from definitions? We reduced dictionaries to their "grounding kernels" (GKs), about 10% of the dictionary, from which all the other words could be defined. The GK words turned out to have psycholinguistic correlates: they were learned at an earlier age and more concrete than the rest of the dictionary. But one can compress still more: the GK turns out to have internal structure, with a strongly connected "kernel core" (KC) and a surrounding layer, from which a hierarchy of definitional distances can be derived, all the way out to the periphery of the full dictionary. These definitional distances, too, are correlated with psycholinguistic variables (age of acquisition, concreteness, imageability, oral and written frequency) and hence perhaps with th...

  3. THE SPECIAL STATUS OF EXOGENOUS WORD-FORMATION WITHIN THE GERMAN WORD-FORMATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Zhilyuk Sergey Aleksandrovich

    2014-06-01

    Full Text Available The article presents the properties of exogenous word-formation system taking into account the existence of two word-formation systems in modern German. On the basis of foreign research which reveal modern trends in German word-formation connected with the internationalization and the development of new European Latin language. The author defines key features of exogenous word-formation, i.e. foreign origin of wordformation units, unmotivated units, unmotivated interchange in base and affixes as well as limited distribution rules in combination with German word-formation. The article analyzes various approaches to word-division, as well as motivated and unmotivated interchange of consonants in bases and in affixes. Unmotivated interchange showcases a special status of the exogenous word-formation within German. Another item covered by the article is the issue of confix. The article has opinions of researchers about correctness of its separation and a list of its features. The author presents his definition of confix: a confix is a bound exogenous word-formation unit with a certain lexical and semantic meaning and joining other units directly or indirectly (through linking morpheme -o-, which is able to make a base. Moreover, some confixes are able to participate at word-combination and have unlimited distribution. So far, confix showcases the integration of exogenous word-formation and traditional German word-formation. The research proves the special status of exogenous word-formation in German. Its results can be used as a base for further analysis of co-existing word-formation systems in German and determination of their characteristic features.

  4. A chain dictionary method for Word Sense Disambiguation and applications

    CERN Document Server

    Tatar, Doina; Mihis, Andreea; Lupea, Mihaiela; Lupsa, Dana; Frentiu, Militon

    2008-01-01

    A large class of unsupervised algorithms for Word Sense Disambiguation (WSD) is that of dictionary-based methods. Various algorithms have as the root Lesk's algorithm, which exploits the sense definitions in the dictionary directly. Our approach uses the lexical base WordNet for a new algorithm originated in Lesk's, namely "chain algorithm for disambiguation of all words", CHAD. We show how translation from a language into another one and also text entailment verification could be accomplished by this disambiguation.

  5. Getting the "Words" In

    Science.gov (United States)

    Bolinger, Dwight

    1970-01-01

    Suggests that grammar is not something into which words are plugged but is rather a mechanism by which words are served and that linguistics scientists must begin to devote a major part of their attention to lexicology. (TO)

  6. Understanding Medical Words

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues Understanding Medical Words Past Issues / Summer 2009 Table of Contents For ... Medicine that teaches you about many of the words related to your health care Do you have ...

  7. Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

    Directory of Open Access Journals (Sweden)

    David Fernandes Cruz Moura

    2012-01-01

    Full Text Available This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.

  8. Cluster headache attack remission with sphenopalatine ganglion stimulation

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Jürgens, Tim P; May, Arne

    2016-01-01

    BACKGROUND: Cluster headache (CH) is a debilitating headache disorder with severe consequences for patient quality of life. On-demand neuromodulation targeting the sphenopalatine ganglion (SPG) is effective in treating the acute pain and a subgroup of patients experience a decreased frequency of CH......, range 699-847) after insertion of an SPG microstimulator. Remission periods (attack-free periods exceeding one month, per the ICHD 3 (beta) definition) occurring during the 24-month study period were characterized. Attack frequency, acute effectiveness, medication usage, and questionnaire data were...

  9. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  10. Modeling Partial Attacks with Alloy (Transcript of Discussion)

    Science.gov (United States)

    Lin, Amerson

    The reason we went into this research, was that we found that partial attacks were extremely hard to model in terms of a language that could be used by an automated tool. Now there are three reasons why this is so. The first is that it is hard to identify these attacks even by hand, because you have to be really creative in thinking, what constitutes a reduction in entropy of the secret, that is significant, because a partial attack is really anything that reduces entropy, it's just that it does not reduce the entropy to zero, which would be a case of a complete attack. Next, it's hard to describe that in a formal language, part of that problem comes from the definition, you have to define what you want to be the goal, if the secret is the entire password, then getting one letter is pretty much a partial attack, but if the secret is that one letter, then getting that one letter is a complete attack. And lastly, applying that logic, how do you measure entropy, how do you measure information leakage, that's also very difficult.

  11. In a Word, History

    Science.gov (United States)

    Dohan, Mary Helen

    1977-01-01

    Understanding words like "bionics" will open the mind to the horizons of another time when words like "railroad" evoked wonder and "to fly to the moon" was a metaphor for the impossible dream. Suggests that history teachers and English teachers should join together in using words to teach both subjects. (Editor/RK)

  12. Grouping Synonyms by Definitions

    CERN Document Server

    Falk, Ingrid; Jacquey, Evelyne; Venant, Fabienne

    2009-01-01

    We present a method for grouping the synonyms of a lemma according to its dictionary senses. The senses are defined by a large machine readable dictionary for French, the TLFi (Tr\\'esor de la langue fran\\c{c}aise informatis\\'e) and the synonyms are given by 5 synonym dictionaries (also for French). To evaluate the proposed method, we manually constructed a gold standard where for each (word, definition) pair and given the set of synonyms defined for that word by the 5 synonym dictionaries, 4 lexicographers specified the set of synonyms they judge adequate. While inter-annotator agreement ranges on that task from 67% to at best 88% depending on the annotator pair and on the synonym dictionary being considered, the automatic procedure we propose scores a precision of 67% and a recall of 71%. The proposed method is compared with related work namely, word sense disambiguation, synonym lexicon acquisition and WordNet construction.

  13. Word meaning acquisition is reflected in brain potentials of isolated words

    Science.gov (United States)

    Kuipers, Jan Rouke; Uminski, Anastasia; Green, Zoe; Hughes, David; Aglietti, Tommaso

    2017-01-01

    Learning a new concept and corresponding word typically involves repeated exposure to the word in the same or a similar context until the link crystallizes in long term memory. Although electrophysiological indices of the result of learning are well documented, there is currently no measure of the process of conceptually-mediated learning itself. Here, we recorded event-related brain potentials from participants who read unfamiliar words presented in isolation followed by a definition that either explained the meaning of the word or was a true, but uninformative statement. Self-reported word knowledge ratings increased for those words that were followed by meaningful definitions and were correlated with a decrease in ERP amplitude of a late frontal negativity (LFN) elicited by the isolated word. Importantly, the rate of LFN amplitude change predicted post-hoc learning outcome measures. Therefore, the LFN is real-time measure that is not under conscious control and which reflects conceptually-mediated learning. We propose that the LFN provides for the first time the opportunity to assess learning during study. PMID:28256517

  14. A Strategy for Assessing Problems in Word Recognition among Dyslexics.

    Science.gov (United States)

    Hoien, Torleiv; Lundberg, Ingvar

    1989-01-01

    This article argues for the importance of studying word-recognition strategies in the assessment of dyslexia. The dual-route model is defended despite attacks from supporters of computational models of modern connectionism. A computer-based diagnostic test battery is described and illustrated via 2 case studies of 15-year-old dyslexic boys in…

  15. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  16. 7 CFR 29.6001 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Definitions. 29.6001 Section 29.6001 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Definitions § 29.6001 Definitions. As used in these standards, the words and...

  17. Guess a New Word

    Institute of Scientific and Technical Information of China (English)

    韩加春

    2010-01-01

    @@ When you read,you will find some new words,what should you do?You can look up the words in the dictionary,but it will take you a lot of time.Sometimes you can guess a new word because you know some parts of the new word.For example,a writer means a person who writes something.Sometimes it is not enough to understand a new word,but to know part of it may help you a lot.

  18. Tanslation of Color Words

    Institute of Scientific and Technical Information of China (English)

    徐丹

    2009-01-01

    Being a minor part in the translation field,the translation of color words is far more complex than people may have imagined.Apart from the literal meaning of color words in the target language,there are other factors that affect the understanding.This paper mainly focuses on three main characteristics of color words that make the translation work difficult-color words'variations and combinations,rich symbolic meanings and culture differences.It also provides possible ways to deal with the prickly problem of finding equivalents,the complexity of transferring symbolic meanings and the subtle problem of crossing culture boundaries in translation of color words.

  19. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  2. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  3. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  4. The Oracle a New Intelligent Cooperative Strategy of Attacks on Trust and Reputation Systems

    Directory of Open Access Journals (Sweden)

    Janiszewski Marek

    2014-06-01

    Full Text Available The paper presents a new concept of attack on trust and reputation systems. The oracle attack could violate the security provided by some of the existing reputation systems. The formal model of the attack is presented in the article on the base of the reference trust model, provided by the author. The author has proved that this type of attack could be eficient. On the other hand, a sort of measures is provided in the paper which could be implemented in the reputation systems to overcome identified vulnerabilities, unfortunately at the cost of increase of system complication. The paper also provides a definition of intelligent strategies of attacks on trust and reputation systems based on cooperation of many malicious nodes and justifies why this type of attacks is a serious threat

  5. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  6. An Enhanced SYN Cookie Defence Method for TCP DDoS Attack

    Directory of Open Access Journals (Sweden)

    Bo Hang

    2011-08-01

    Full Text Available With the development of network, the issues of network security are rapidly becoming a serious problem, and the Denial of Service (DoS attack has already become the greatest threat to the network. SYN Flood attack is one of the most common distributed denial of service attack way (DDoS. This paper presents an improved SYN Cookie method, designing a novel attack detector processing and a enhanced attack respondor with a new cookie verification algorithm and changing the definition of cookie field, to reduce algorithm complexity with the ensurance of security. The experiment results show that the proposed method provided an average computational complexity reduction of 30% compared with the traditional method. The new method can be an effective defense against the TCP SYN Flood attack with a lower complexity.

  7. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  8. Comparison of acute phase response during attack and attack-free period in children with Familial Mediterranean Fever

    Directory of Open Access Journals (Sweden)

    Erdal Çakmak

    2013-06-01

    Full Text Available Objective: The aim of this study was to compare acutephase reactant (AFR levels at attack period and attackfreeperiod under colchicine treatment in children with FamilialMediterranean Fever (FMF.Methods: The diagnosis of FMF was done based on clinicalcriteria and patients were prospectively followed upfor average of 1.2 years. Symptom-onset age, age at diagnosis,clinical symptoms and features of FMF attackswere recorded. MEFV gene mutations were detected byreverse hybridization (strip assay method. Peripheralblood leukocyte count, erythrocyte sedimentation rate(ESR, C-reactive protein (CRP and blood fibrinogen levelswere measured by standard methods, both at attackperiod and during attack-free period.Results: Totally 105 (55 girls, 50 boys children with FMFwere included. The mean age was 8.9±3.2 years, meansymptom onset age was 5.9 years and mean age at diagnosiswas 8.1 years. MEFV gene mutations were asfollows: E148Q (29.2%, M694V (24.8%, R761H (15.3%and V726A (13.1%. The mean AFR values were overnormal values in attack period and there was at least onehigh AFR level in 80.0% of patients. In attack-free period,although the mean values of all AFRs were within normallimits, 31.4% of patients had at least one high AFR level.Conclusion: Based on these data, one-third of FMF childrenhad a high AFR level, which may be a marker of subclinicalinflammation. In children with continuous inflammationduring attack-free period, a new anti-inflammatorydrug additional to colchicine can be considered in order toprevent complications of chronic inflammation. J Clin ExpInvest 2013; 4 (2: 213-218Key words: Familial Mediterranean Fever, acute phasereactants, children, attack period, attack-free period

  9. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  10. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  11. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  12. Word Sense Disambiguation using Optimised Combinations of Knowledge Sources

    CERN Document Server

    Wilks, Y A; Wilks, Yorick; Stevenson, Mark

    1998-01-01

    Word sense disambiguation algorithms, with few exceptions, have made use of only one lexical knowledge source. We describe a system which performs unrestricted word sense disambiguation (on all content words in free text) by combining different knowledge sources: semantic preferences, dictionary definitions and subject/domain codes along with part-of-speech tags. The usefulness of these sources is optimised by means of a learning algorithm. We also describe the creation of a new sense tagged corpus by combining existing resources. Tested accuracy of our approach on this corpus exceeds 92%, demonstrating the viability of all-word disambiguation rather than restricting oneself to a small sample.

  13. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  14. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made

  15. Word Pocket Guide

    CERN Document Server

    Glenn, Walter

    2004-01-01

    Millions of people use Microsoft Word every day and, chances are, you're one of them. Like most Word users, you've attained a certain level of proficiency--enough to get by, with a few extra tricks and tips--but don't get the opportunity to probe much further into the real power of Word. And Word is so rich in features that regardless of your level of expertise, there's always more to master. If you've ever wanted a quick answer to a nagging question or had the thought that there must be a better way, then this second edition of Word Pocket Guide is just what you need. Updated for Word 2003

  16. Proofreading for word errors.

    Science.gov (United States)

    Pilotti, Maura; Chodorow, Martin; Agpawa, Ian; Krajniak, Marta; Mahamane, Salif

    2012-04-01

    Proofreading (i.e., reading text for the purpose of detecting and correcting typographical errors) is viewed as a component of the activity of revising text and thus is a necessary (albeit not sufficient) procedural step for enhancing the quality of a written product. The purpose of the present research was to test competing accounts of word-error detection which predict factors that may influence reading and proofreading differently. Word errors, which change a word into another word (e.g., from --> form), were selected for examination because they are unlikely to be detected by automatic spell-checking functions. Consequently, their detection still rests mostly in the hands of the human proofreader. Findings highlighted the weaknesses of existing accounts of proofreading and identified factors, such as length and frequency of the error in the English language relative to frequency of the correct word, which might play a key role in detection of word errors.

  17. Circular words and applications

    Directory of Open Access Journals (Sweden)

    Benoît Rittaud

    2011-08-01

    Full Text Available We define the notion of circular words, then consider on such words a constraint derived from the Fibonacci condition. We give several results on the structure of these circular words, then mention possible applications to various situations: periodic expansion of numbers in numeration systems, "gcd-property" of integer sequences, partition of the prefix of the fixed point of the Fibonacci substitution, spanning trees of a wheel. Eventually, we mention some open questions.

  18. On the word ponentino

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2009-06-01

    Full Text Available This work studies a very specific use of the word ponentino: It is used as a synonym of ‘Spaniard’ or, in a slightly more general context, as a word to refer to ‘people from the Western Mediterranean’, where Western Mediterranean stands for the Mediterranean sea stretching to the west of Sicily. Therefore, such a use of the word splits the interior sea into two halves, which do neither correspond with the old division between the Western Empire and the Byzantine Empire nor the clash between the Christian world and the Ottoman Empire. We propose an Italian origin for this particular use of the word.

  19. Word 2003 for dummies

    CERN Document Server

    Gookin, Dan

    2013-01-01

    Want to write great looking documents but can't seem to get ahandle on paragraph structuring? Unfamiliar with some of thebuttons and functions on your menu bar? Need to add page numbersfor a paper but can't find the controls? Word 2003 ForDummies will show you the quick and easy way to navigatethrough the trickiness of Microsoft Word. This book will be yourcomprehensive guide to using this word processor like a pro. Word 2003 For Dummies shows you all the essentials ofbuilding, reviewing, and adding cool new features to Worddocuments. No wonder the previous editions sold over 1.7 millioncopie

  20. Consolidation of novel word learning in native English-speaking adults.

    Science.gov (United States)

    Kurdziel, Laura B F; Spencer, Rebecca M C

    2016-01-01

    Sleep has been shown to improve the retention of newly learned words. However, most methodologies have used artificial or foreign language stimuli, with learning limited to word/novel word or word/image pairs. Such stimuli differ from many word-learning scenarios in which definition strings are learned with novel words. Thus, we examined sleep's benefit on learning new words within a native language by using very low-frequency words. Participants learned 45 low-frequency English words and, at subsequent recall, attempted to recall the words when given the corresponding definitions. Participants either learned in the morning with recall in the evening (wake group), or learned in the evening with recall the following morning (sleep group). Performance change across the delay was significantly better in the sleep than the wake group. Additionally, the Levenshtein distance, a measure of correctness of the typed word compared with the target word, became significantly worse following wake, whereas sleep protected correctness of recall. Polysomnographic data from a subsample of participants suggested that rapid eye movement (REM) sleep may be particularly important for this benefit. These results lend further support for sleep's function on semantic learning even for word/definition pairs within a native language.

  1. Formal Definition of Artificial Intelligence

    OpenAIRE

    Dobrev, Dimiter

    2005-01-01

    * This publication is partially supported by the KT-DigiCult-Bg project. A definition of Artificial Intelligence (AI) was proposed in [1] but this definition was not absolutely formal at least because the word "Human" was used. In this paper we will formalize the definition from [1]. The biggest problem in this definition was that the level of intelligence of AI is compared to the intelligence of a human being. In order to change this we will introduce some parameters to which AI ...

  2. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ... victims of the September 11, 2001, attacks. 674.64 Section 674.64 Education Regulations of the Offices of... survivors of victims of the September 11, 2001, attacks. (a) Definition of terms. As used in this section... the aircraft or any subsequent fire, explosions, or building collapses. Generally, this includes...

  3. PROPAGANDA: HOW A GOOD WORD WENT WRONG

    Directory of Open Access Journals (Sweden)

    CRISTINA LUCIA ŞUTIU

    2012-11-01

    Full Text Available What is propaganda and what is wrong with it? This may be the main question when studying this complex phenomenon. In this article we shall try to give an answer to this question and to find the most appropriate definition for this disputed concept. Nowadays, propaganda has a negative connotation and usually it is used to discredit somebody’s speech or actions, by implying that he is both illogical and unethical. But propaganda wasn’t seen always like that! In order to give an objective definition of this concept, it is very important for us to understand first what exactly happened with this word throughout history.

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  6. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. Word-identification priming for ignored and attended words

    Science.gov (United States)

    Stone, M.; Ladd, S. L.; Vaidya, C. J.; Gabrieli, J. D.

    1998-01-01

    Three experiments examined contributions of study phase awareness of word identity to subsequent word-identification priming by manipulating visual attention to words at study. In Experiment 1, word-identification priming was reduced for ignored relative to attended words, even though ignored words were identified sufficiently to produce negative priming in the study phase. Word-identification priming was also reduced after color naming relative to emotional valence rating (Experiment 2) or word reading (Experiment 3), even though an effect of emotional valence upon color naming (Experiment 2) indicated that words were identified at study. Thus, word-identification priming was reduced even when word identification occurred at study. Word-identification priming may depend on awareness of word identity at the time of study.

  9. Word-identification priming for ignored and attended words

    Science.gov (United States)

    Stone, M.; Ladd, S. L.; Vaidya, C. J.; Gabrieli, J. D.

    1998-01-01

    Three experiments examined contributions of study phase awareness of word identity to subsequent word-identification priming by manipulating visual attention to words at study. In Experiment 1, word-identification priming was reduced for ignored relative to attended words, even though ignored words were identified sufficiently to produce negative priming in the study phase. Word-identification priming was also reduced after color naming relative to emotional valence rating (Experiment 2) or word reading (Experiment 3), even though an effect of emotional valence upon color naming (Experiment 2) indicated that words were identified at study. Thus, word-identification priming was reduced even when word identification occurred at study. Word-identification priming may depend on awareness of word identity at the time of study.

  10. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  11. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  12. Manage Your Words.

    Science.gov (United States)

    Ricks, Betty R.

    Words, like any other information resource, must be managed in order to contribute to the achievement of organizational goals. Managing communication refers to planning, organizing, leading, and controlling words. Planning determines goals and how they can be best accomplished, and aids in providing direction for the message, thus increasing the…

  13. Manage Your Words.

    Science.gov (United States)

    Ricks, Betty R.

    Words, like any other information resource, must be managed in order to contribute to the achievement of organizational goals. Managing communication refers to planning, organizing, leading, and controlling words. Planning determines goals and how they can be best accomplished, and aids in providing direction for the message, thus increasing the…

  14. Magritte's Words and Images.

    Science.gov (United States)

    Roque, Georges

    1989-01-01

    Argues that Rene Magritte's experiments with words and images are preceded by other experiments with his surrealist friends in Brussels. States that the surrealists' failure to adequately represent women causes Magritte to treat both images and words as mere representations, subject to an equally radical splitting from the "real" thing…

  15. Fundamental Vocabulary Selection Based on Word Familiarity

    Science.gov (United States)

    Sato, Hiroshi; Kasahara, Kaname; Kanasugi, Tomoko; Amano, Shigeaki

    This paper proposes a new method for selecting fundamental vocabulary. We are presently constructing the Fundamental Vocabulary Knowledge-base of Japanese that contains integrated information on syntax, semantics and pragmatics, for the purposes of advanced natural language processing. This database mainly consists of a lexicon and a treebank: Lexeed (a Japanese Semantic Lexicon) and the Hinoki Treebank. Fundamental vocabulary selection is the first step in the construction of Lexeed. The vocabulary should include sufficient words to describe general concepts for self-expandability, and should not be prohibitively large to construct and maintain. There are two conventional methods for selecting fundamental vocabulary. The first is intuition-based selection by experts. This is the traditional method for making dictionaries. A weak point of this method is that the selection strongly depends on personal intuition. The second is corpus-based selection. This method is superior in objectivity to intuition-based selection, however, it is difficult to compile a sufficiently balanced corpora. We propose a psychologically-motivated selection method that adopts word familiarity as the selection criterion. Word familiarity is a rating that represents the familiarity of a word as a real number ranging from 1 (least familiar) to 7 (most familiar). We determined the word familiarity ratings statistically based on psychological experiments over 32 subjects. We selected about 30,000 words as the fundamental vocabulary, based on a minimum word familiarity threshold of 5. We also evaluated the vocabulary by comparing its word coverage with conventional intuition-based and corpus-based selection over dictionary definition sentences and novels, and demonstrated the superior coverage of our lexicon. Based on this, we conclude that the proposed method is superior to conventional methods for fundamental vocabulary selection.

  16. Flexible Word Classes

    DEFF Research Database (Denmark)

    2013-01-01

    • First major publication on the phenomenon • Offers cross-linguistic, descriptive, and diverse theoretical approaches • Includes analysis of data from different language families and from lesser studied languages This book is the first major cross-linguistic study of 'flexible words', i.e. words...... that cannot be classified in terms of the traditional lexical categories Verb, Noun, Adjective or Adverb. Flexible words can - without special morphosyntactic marking - serve in functions for which other languages must employ members of two or more of the four traditional, 'specialised' word classes. Thus......, flexible words are underspecified for communicative functions like 'predicating' (verbal function), 'referring' (nominal function) or 'modifying' (a function typically associated with adjectives and e.g. manner adverbs). Even though linguists have been aware of flexible world classes for more than...

  17. WordPress Bible

    CERN Document Server

    Brazell, Aaron

    2011-01-01

    Get the latest word on the biggest self-hosted blogging tool on the marketWithin a week of the announcement of WordPress 3.0, it had been downloaded over a million times. Now you can get on the bandwagon of this popular open-source blogging tool with WordPress Bible, 2nd Edition. Whether you're a casual blogger or programming pro, this comprehensive guide covers the latest version of WordPress, from the basics through advanced application development. If you want to thoroughly learn WordPress, this is the book you need to succeed.Explores the principles of blogging, marketing, and social media

  18. Differential Fault Attack on KASUMI Cipher Used in GSM Telephony

    Directory of Open Access Journals (Sweden)

    Zongyue Wang

    2014-01-01

    Full Text Available The confidentiality of GSM cellular telephony depends on the security of A5 family of cryptosystems. As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key. Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key. The time complexity is only 232 encryptions. We have practically simulated the attack on a PC which takes only a few minutes to recover all the key bits. The simulation also experimentally verifies the correctness and complexity.

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  20. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  1. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  2. A New Academic Word List.

    Science.gov (United States)

    Coxhead, Averil

    2000-01-01

    Describes the development and evaluation of a new academic word list that was completed from a corpus of 3.5 million running words of written academic text by examining the range and frequency of words outside the first 2,000 most frequently occurring words in English. Explains the problems with existing word lists intended to guide materials…

  3. GUESSING WORDS FROM CONTEXT

    Institute of Scientific and Technical Information of China (English)

    LiLing; YangWeidong

    2004-01-01

    For the large number of low-frequency words in .foreign language vocabulary acquisition, the strategy many experts in language teaching methods have been advocating is to teach the students the ways to guess .from context. However, two American scholars, Schatz and Baldwin (1986), on the basis of their experiments made on American students, argued that contextual clues are unreliable predictors of word meanigs.Context does not usually provide clues, but inhibit the correct prediction of word meanings just as o[ten as they facilitate them.

  4. Electronic Word of Behavior

    DEFF Research Database (Denmark)

    Kunst, Katrine

    It is widely recognized that the transition from Word-of-mouth (WOM) to electronic word-of-mouth (eWOM) allows for a wider and faster spread of information. However, little attention has been given to how digital channels expand the types of information consumers share. In this paper, we argue...... of the concepts do not capture this new kind of consumer-to-consumer information transfer about products and services. Consequently, we suggest an extension of those concepts: Electronic Word of Behavior....

  5. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  6. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  7. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  8. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  9. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  10. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  11. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  12. Words: blocks, amoebas, or patches of fog? Artificial intelligence and the conceptual foundations of fuzzy logic

    Science.gov (United States)

    Jaki, Stanley L.

    1996-06-01

    Words are the fundamental carriers of information. Words that refer to numbers stand apart from all other words in one respect: Numbers are concepts that lend themselves to spatial representations with exact contours. Yet the verbal definition of numbers, through which their meaning is defined, shares in a property common to all words: their verbal definition cannot be given a spatial representation with exact contours. In that definitional respect, words are not even comparable to amoebas which, although they constantly change their shapes, have clear boundaries. Words are best to be likened to patches of fog that not only change but have no strict boundaries. While this does not land all discourse in the realm of half-truths, it sets basic limits to what can be achieved by fuzzy logic and programs of artificial intelligence.

  13. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  14. Counting Irreducible Double Occurrence Words

    CERN Document Server

    Burns, Jonathan

    2011-01-01

    A double occurrence word $w$ over a finite alphabet $\\Sigma$ is a word in which each alphabet letter appears exactly twice. Such words arise naturally in the study of topology, graph theory, and combinatorics. Recently, double occurrence words have been used for studying DNA recombination events. We develop formulas for counting and enumerating several elementary classes of double occurrence words such as palindromic, irreducible, and strongly-irreducible words.

  15. How to define a word in a lexical network?

    Directory of Open Access Journals (Sweden)

    Dorota Sikora

    2012-01-01

    Full Text Available As underlined in Wierzbicka (1996: 239, a «linguistic definition is a scientific hypothesis about the concept encoded in a given word». The present paper focuses on the problem of what such hypothesis is about. Lexicon of any language is structured with a set of connections relating lexical items. That is to say that speakers of any language need to master not only separate words, but rather a cluster of connected senses. If so, then a lexical definition should lay out the concept the word lexicalizes in the way that gives access to the whole grasp of its conceptual, paradigmatic and syntagmatic relations. We discuss the topic of definitional structures developed in the context of the French Lexical Network (Réseau Lexical du Français.

  16. Images/Words.

    Science.gov (United States)

    MacDonald, Martin

    1992-01-01

    Maintains that words come from strongly felt images. Contrasts the stark language environment of the author's first school years with his vivid memories of stories and poetry in his grandparents', parents', and his own house. (SR)

  17. Accessing the Spoken Word

    NARCIS (Netherlands)

    Goldman, J.; Renals, S.; Bird, S.; de Jong, Franciska M.G.; Federico, M.; Fleischhauer, C.; Kornbluh, M.; Lamel, L.; Oard, D.W.; Stewart, C.; Wright, R.

    2005-01-01

    Spoken-word audio collections cover many domains, including radio and television broadcasts, oral narratives, governmental proceedings, lectures, and telephone conversations. The collection, access, and preservation of such data is stimulated by political, economic, cultural, and educational needs.

  18. Sonority and early words

    DEFF Research Database (Denmark)

    Kjærbæk, Laila; Boeg Thomsen, Ditte; Lambertsen, Claus

    2015-01-01

    Syllables play an important role in children’s early language acquisition, and children appear to rely on clear syllabic structures as a key to word acquisition (Vihman 1996; Oller 2000). However, not all languages present children with equally clear cues to syllabic structure, and since the spec......Syllables play an important role in children’s early language acquisition, and children appear to rely on clear syllabic structures as a key to word acquisition (Vihman 1996; Oller 2000). However, not all languages present children with equally clear cues to syllabic structure, and since...... acquisition therefore presents us with the opportunity to examine how children respond to the task of word learning when the input language offers less clear cues to syllabic structure than usually seen. To investigate the sound structure in Danish children’s lexical development, we need a model of syllable......-29 months. For the two children, the phonetic structure of the first ten words to occur is compared with that of the last ten words to occur before 30 months of age, and with that of ten words in between. Measures related to the sonority envelope, viz. sonority types and in particular sonority rises...

  19. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  20. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  1. WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION

    NARCIS (Netherlands)

    Chen, W.; Gader, P.

    2004-01-01

    Word level training refers to the process of learning the parameters of a word recognition system based on word level criteria functions. Previously, researchers trained lexicon­driven handwritten word recognition systems at the character level individually. These systems generally use statistical o

  2. WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION

    NARCIS (Netherlands)

    Chen, W.; Gader, P.

    2004-01-01

    Word level training refers to the process of learning the parameters of a word recognition system based on word level criteria functions. Previously, researchers trained lexicon­driven handwritten word recognition systems at the character level individually. These systems generally use statistical

  3. Word of Jeremiah - Word of God

    DEFF Research Database (Denmark)

    Holt, Else Kragelund

    2007-01-01

    The article examines the relationship between God, prophet and the people in the Book of Jeremiah. The analysis shows a close connection, almost an identification, between the divine word (and consequently God himself) and the prophet, so that the prophet becomes a metaphor for God. This is done...... through exegetical studies of the call narrative (Jer 1), the Temple Sermon (Jer 7) and narratives about the prophet's seclusion from the people (e.g. Jer 16). In addition there is an analysis of Jer 36, the chapter telling about the writing down of the Book of Jeremiah. The main message of this chapter...

  4. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  5. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  6. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  7. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  8. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  9. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  10. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  11. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  12. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  14. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  15. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  16. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  18. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  19. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  20. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  1. Finding Rising and Falling Words

    NARCIS (Netherlands)

    Tjong Kim Sang, E.

    2016-01-01

    We examine two different methods for finding rising words (among which neologisms) and falling words (among which archaisms) in decades of magazine texts (millions of words) and in years of tweets (billions of words): one based on correlation coefficients of relative frequencies and time, and one

  2. Empirical studies on word representations

    NARCIS (Netherlands)

    Suster, Simon

    2016-01-01

    One of the most fundamental tasks in natural language processing is representing words with mathematical objects (such as vectors). The word representations, which are most often estimated from data, allow capturing the meaning of words. They enable comparing words according to their semantic simila

  3. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  4. DNS Pharming through PHP Injection: Attack Scenario and Investigation

    Directory of Open Access Journals (Sweden)

    Divya Rishi Sahu

    2015-03-01

    Full Text Available With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS, such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the 'hosts file'; Second, It introduces an investigation process against alteration in 'hosts file' through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

  5. Words are not things

    Science.gov (United States)

    Moore, J.

    2000-01-01

    On a traditional view, words are the fundamental units of verbal behavior. They are independent, autonomous things that symbolically represent or refer to other independent, autonomous things, often in some other dimension. Ascertaining what those other things are constitutes determining the meaning of a word. On a behavior-analytic view, verbal behavior is ongoing, functional operant activity occasioned by antecedent factors and reinforced by its consequences, particularly consequences that are mediated by other members of the same verbal community. Functional relations rather than structure select the response unit. The behavior-analytic point of view clarifies such important contemporary issues in psychology as (a) the role of scientific theories and explanations, (b) educational practices, and (c) equivalence classes, so that there is no risk of strengthening the traditional view that words are things that symbolically represent other things. PMID:22477219

  6. Bouyei word formation

    Directory of Open Access Journals (Sweden)

    Attasith Boonsawasd

    2012-12-01

    Full Text Available The Bouyei language is divided into three vernaculars, the southern vernacular, the central vernacular and the southwestern vernacular. This paper aims to describe the lexicology of the southern vernacular of the Bouyei language focusing on word formation process. Bouyei words are formed by affixing, compounding and reduplicating. First, the affixation consists of prefixing and suffixing. Infixing is not found in this language. Second, the compound is divided into the semantic and syntactic compound. Finally, the reduplication is divided into the simple and complex reduplication. The simple reduplication is normally used to emphasize the meaning of the root or to indicate plurality.

  7. Italian Word Association Norms.

    Science.gov (United States)

    1966-07-01

    Ricerche Istituto Nazionale I Psicologia , Roma Italy. A different, but not unrelated, approach is to use word association norms to study other types of... Psicologia , 1961 , 55, 1,13-155. Chiari, S. 11 comportamento associative nell’eta ovolutiva, Rivista di Psicologia , 1 96 1b , 55, 175-189. Cofer, C.N...and Russell, VI.A. Systematic changes in word association norms: 1910-1952. Journal of Abnormal and Social Psychology, 19C0, 60, 293-303. lilb Kurez, I

  8. Word of mouth komunikacija

    Directory of Open Access Journals (Sweden)

    Žnideršić-Kovač Ružica

    2009-01-01

    Full Text Available Consumers' buying decision is very complex multistep process in which a lot of factors have significant impact. Traditional approach to the problem of communication between a company and its consumers, implies usage of marketing mix instruments, mostly promotion mix, in order to achieve positive purchase decision. Formal communication between company and consumers is dominant comparing to informal communication, and even in marketing literature there is not enough attention paid to this type of communication such as Word of Mouth. Numerous of research shows that consumers emphasize crucial impact of Word of Mouth on their buying decision. .

  9. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  10. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  11. Berge, word lug! Werklikheid, word water

    Directory of Open Access Journals (Sweden)

    Hein Viljoen

    1976-03-01

    Full Text Available Breyten Breytenbach is vandag erg omstrede; sy werk ook. Omstrede in die eerste instansie om sy politieke betrokkenheid. Hy skryf iramers (of haal aan "The duty of the artist is to overthrow his government" (Boom p 119. Sy digbundel Skrytj om 'n sinkende skip blou te verf (1972 is om politieke redes verbied - twee jaar nadat dit verskyn het. Sy jongste prosaboek, 'n Seisoen in die paradys (ironiese sinspeling op Rimbaud se Une Saison en enfer, sal - uit vrees vir sensuur om politieke redes - waarskynlik nooit verskyn nie (Anon 1975a kol 1. 'n Paar hoofstukke daarvan het darem al in Rapport verskyn (Breytenbach 1974c. By sy verhoor in Pretoria het Breytenbach onder andere om verskoning gevra vir die dinge wat hy in Skryt geskryf het, maar dit het sy omstredenheid eerder vererger. Hierdie dinge mag nie uit die oog verloor word nie, omdat dit neig om die oordeel oor sy werk te vertroebel.

  12. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  13. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  14. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  17. Damage modelling in concrete subject to sulfate attack

    Directory of Open Access Journals (Sweden)

    N. Cefis

    2014-07-01

    Full Text Available In this paper, we consider the mechanical effect of the sulfate attack on concrete. The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.

  18. About a hypothetical terrorist attack on a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  19. Definitions of Idioms in Preadolescents, Adolescents, and Adults

    Science.gov (United States)

    Chan, Yen-Ling; Marinellie, Sally A.

    2008-01-01

    The purpose of this study was to expand the current literature on word definitions by focusing on definitions of idioms provided by several age groups. Preadolescents, young adolescents, older adolescents, and adults wrote definitions for 10 frequently used idioms and also rated their familiarity with the idiomatic expressions. Participants'…

  20. A Newly Invented Word

    Institute of Scientific and Technical Information of China (English)

    董秀芹

    2004-01-01

    It's not only rocket scientists and journalists who are following the course of "Shenzhou V', or "Divine Vessel V'. There are also lexicographers, or dictionary compilers. The flight of the spacecraft last week might help put some new words into orbit.

  1. Offensive Words, Lethal Weapons

    Science.gov (United States)

    Jacoby, Russell

    2007-01-01

    The old childhood ditty "sticks and stones may break my bones, but words will never hurt me" has proved wiser than the avalanche of commentary provoked by the recent insults by Don Imus and the killings at Virginia Tech. Our society forbids public name-calling but allows sticks and stones. Anyone can acquire a gun, but everyone must be careful…

  2. Sonority and early words

    DEFF Research Database (Denmark)

    Kjærbæk, Laila; Boeg Thomsen, Ditte; Lambertsen, Claus;

    2015-01-01

    acquisition therefore presents us with the opportunity to examine how children respond to the task of word learning when the input language offers less clear cues to syllabic structure than usually seen. To investigate the sound structure in Danish children’s lexical development, we need a model of syllable...

  3. Doing words together

    DEFF Research Database (Denmark)

    Fusaroli, Riccardo; Østergaard, Svend; Raczaszek-Leonardi, Joanna

    In this paper we test the effects of social interactions in embodied problem solving by employing a Scrabble-like setting. 28 pairs of participants had to generate as many words as possible from 2 balanced sets of 7 letters, which they could manipulate, either individually or collectively...

  4. New Words and Expressions

    Institute of Scientific and Technical Information of China (English)

    陈福生

    1984-01-01

    @@ To start with, I mention that certain new words and expressions are used relatively often by journalists when they compose reports and articles. Their writing is said to be all right for a newspaper, but that lacks imagination and beauty. Examples:

  5. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  6. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  7. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  8. Examining Multiple Dimensions of Word Knowledge for Content Vocabulary Understanding

    Science.gov (United States)

    Cervetti, Gina N.; Tilson, Jennifer L.; Castek, Jill; Bravo, Marco A.; Trainin, Guy

    2012-01-01

    This study traces the development of a vocabulary measure designed to assess multiple types of word knowledge. The assessment, which was administered in conjunction with a science unit about weather and the water cycle for third-and-fourth graders, included items for six knowledge types--recognition, definition, classification/example, context,…

  9. Main Contents Abstracts and Key Words

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Metaphor and Symbol: Religious Connotations and its Spread of LaoZi's Illustrations of the Eighty-one Conversions HU Chuntao [Abstract] LaoZi's illustrations of the eighty-one conversions has some kinds of connection with LaoZiHuaHU Oing, thus it suffered disputes under the argument between Buddhism and Taoism. In twenty years after its first appearance, the set of illustration developed rapidly, but it once disappeared under the attack of Buddhism and governor in Yuan dynasty. Over a century later, it came back in the first half of the 15th century and spreaded widely in the 16th century. The set of illustration and its process of spreading filled with metaphorical atmosphere. [Key words]LaoZi's illustrations of the eighty-one conversions; relationship between Buddhism and Taoism; spread

  10. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  11. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  12. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  13. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  14. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  15. Weight-related words associated with figure silhouettes.

    Science.gov (United States)

    Greenleaf, Christy; Starks, Misty; Gomez, Laura; Chambliss, Heather; Martin, Scott

    2004-12-01

    Antifat attitudes and obesity bias are prevalent in Western society; however, little is known about the social meanings and connotations of weight-related words such as fat, overweight, and obese (e.g., Robison & Erdman, 1998). The purpose of this study was to explore college students' perceptions of weight-related terminology. Participants (n=131) completed a modified figure rating scale in which they identified male and female figure silhouettes most associated with a variety of weight-related words and personal characteristics. Additionally, participants completed a word association task and provided definitions of five weight terms. Results indicated that participants grouped weight terms into two groupings (i.e., "slender" and "heavy" weight terms) both in the figure rating task and in the word association and definition tasks. Both male and female participants selected smaller female figure silhouettes for the weight terms overweight, large, fat, and normal weight than for the male figure silhouettes. Moreover, associations between weight-related words and personal characteristics, including normal weight -physically fit and overweight -lazy, were found. The results suggest that weight-related words carry with them social meanings and values that reflect an "ideology of blame."

  16. Right word making sense of the words that confuse

    CERN Document Server

    Morrison, Elizabeth

    2012-01-01

    'Affect' or 'effect'? 'Right', 'write' or 'rite'? English can certainly be a confusing language, whether you're a native speaker or learning it as a second language. 'The Right Word' is the essential reference to help people master its subtleties and avoid making mistakes. Divided into three sections, it first examines homophones - those tricky words that sound the same but are spelled differently - then looks at words that often confuse before providing a list of commonly misspelled words.

  17. Infants Track Word Forms in Early Word-Object Associations

    Science.gov (United States)

    Zamuner, Tania S.; Fais, Laurel; Werker, Janet F.

    2014-01-01

    A central component of language development is word learning. One characterization of this process is that language learners discover objects and then look for word forms to associate with these objects (Mcnamara, 1984; Smith, 2000). Another possibility is that word forms themselves are also important, such that once learned, hearing a familiar…

  18. Choroid thickness and ocular pulse amplitude in migraine during attack.

    Science.gov (United States)

    Dervisogullari, M S; Totan, Y; Gençler, O S

    2015-03-01

    To compare the choroidal thickness and ocular pulse amplitude (OPA) measurements obtained during the attack period in migraine patients and age and gender matched control group participants using high definition optical coherence tomography (OCT). Thirty eyes at the side of the headache of 30 subjects with a diagnosis of migraine with or without aura and unilateral migraine and 29 age and gender matched healthy participants were enrolled in this observational, cross-sectional study. OCT scans were performed to all participants. Choroidal thicknesses were measured at the fovea, 1500 μm nasal and 1500 μm temporal to the fovea. Intraocular pressure (IOP) and OPA were also measured. The choroidal thickness measurements obtained during the attack period in migraine patients were (mean±SD) 279.82±35.87, 250.05±29.49, and 239.58±27.92 and in control group were 308.20±44.97, 276.95±41.39, and 281.60±41.38 at foveal, nasal, and temporal measurement points, respectively. Choroidal thickness significantly decreased according to the control group (P0.05). Choroidal thickness was found to be significantly decreased in unilateral migraine patients during the attack period when compared with the control group, whereas OPA did not change. The possible implications of these findings on the association between migraine and glaucoma are discussed.

  19. Liability for damage caused by terrorist attacks; Haftung fuer Terrorismusschaeden

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2004-10-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  20. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  1. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  2. Word Origins: Building Communication Connections.

    Science.gov (United States)

    Rubenstein, Rheta N.

    2000-01-01

    Proposes examining word origins as a teaching strategy for helping middle school students speak the language of mathematics as well as promote students' general vocabulary development. Includes roots, meanings, related words, and notes for middle school mathematics vocabulary. (KHR)

  3. Word Origins: Building Communication Connections.

    Science.gov (United States)

    Rubenstein, Rheta N.

    2000-01-01

    Proposes examining word origins as a teaching strategy for helping middle school students speak the language of mathematics as well as promote students' general vocabulary development. Includes roots, meanings, related words, and notes for middle school mathematics vocabulary. (KHR)

  4. Recipes: beyond the words.

    Science.gov (United States)

    Wharton, Tim

    2010-01-01

    This paper explores recipes and food writing from the perspective of linguistics—or, more specifically, pragmatics. It looks briefly at the discourse of recipes, at how they work and what kinds of linguistic structures are typically involved. The main theme of the paper, however, is that the best food writing is as much about the images and feelings the writer wants to conjure in the mind of the reader as it is about the words it contains, or the way that discourse is set out. In order to shed any real light on recipe writing, then, we need to explain how they manage to convey moods, impressions, emotions, and feelings. We need to go beyond the words. The paper features examples from, among others, the work of Elizabeth David and Edouard de Pomaine, serving to illustrate the theoretical points made.

  5. Sonority and early words

    DEFF Research Database (Denmark)

    Kjærbæk, Laila; Boeg Thomsen, Ditte; Lambertsen, Claus

    2015-01-01

    acquisition therefore presents us with the opportunity to examine how children respond to the task of word learning when the input language offers less clear cues to syllabic structure than usually seen. To investigate the sound structure in Danish children’s lexical development, we need a model of syllable...... structure; and as the theoretical basis for our analyses related to sonority we present Basbøll’s Sonority Syllable Model for phonotactics, which is based upon a non-circular version of a sonority hierarchy. We investigate spontaneous child language output in a longitudinal corpus with two children aged 9......Syllables play an important role in children’s early language acquisition, and children appear to rely on clear syllabic structures as a key to word acquisition (Vihman 1996; Oller 2000). However, not all languages present children with equally clear cues to syllabic structure, and since...

  6. Rozanov and the Word

    OpenAIRE

    Dimbleby, L. L.

    1996-01-01

    The thesis is an attempt to relate aspects of Rozanov's writing to the Russian tradition of the word, as exemplified in the work of writers and thinkers, contemporary and near-contemporary to Rozanov. The first part establishes key features of this tradition through the work of writers such as Ern, Losev, Mandel'shtam and Averintsev. The relevance of Bakhtin for a reading of Rozanov, and of Rozanov for reading Bakhtin, is argued through an extended comparison of the tw...

  7. Hypnosis: medicine's dirty word.

    Science.gov (United States)

    Upshaw, William N

    2006-10-01

    This paper attempts to understand the relationship between the clinical efficacy of hypnosis and its negative perception among many medical educators, practitioners and the general public. By exploring the history of hypnosis, an attempt was made to point out several events that may have led to both the past and current misperception of hypnosis which the author believes have caused hypnosis to become "medicine's dirty word".

  8. Plagiarism: Words and ideas

    OpenAIRE

    Bouville, Mathieu

    2008-01-01

    Plagiarism is a crime against academy. It deceives readers, hurts plagiarized authors, and gets the plagiarist undeserved benefits. However, even though these arguments do show that copying other people's intellectual contribution is wrong, they do not apply to the copying of words. Copying a few sentences that contain no original idea (e.g. in the introduction) is of marginal importance compared to stealing the ideas of others. The two must be clearly distinguished, and the 'plagiarism' labe...

  9. The Importance of Words

    Institute of Scientific and Technical Information of China (English)

    Denise; Noblet

    2002-01-01

    Living in China without knowing its language, I found myself in a strange si-lence. Yet out of this silence came a beatiful lesson. I learned that without words to highlight our differences, the language of emo-tion reveals us to be the same. We all love, hope, fear and dream. We long for ac-ceptance. We thrive in warm families. We all laugh and cry.

  10. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  11. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  12. WordPress multisite administration

    CERN Document Server

    Longren, Tyler

    2013-01-01

    This is a simple, concise guide with a step-by-step approach, packed with screenshots and examples to set up and manage a network blog using WordPress.WordPress Multisite Administration is ideal for anyone wanting to familiarize themselves with WordPress Multisite. You'll need to know the basics about WordPress, and having at least a broad understanding of HTML, CSS, and PHP will help, but isn't required.

  13. Bringing Definitions into High Definition

    Science.gov (United States)

    Mason, John

    2010-01-01

    Why do definitions play such a central role in mathematics? It may seem obvious that precision about the terms one uses is necessary in order to use those terms reasonably (while reasoning). Definitions are chosen so as to be definite about the terms one uses, but also to make both the statement of, and the reasoning to justify, theorems as…

  14. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  15. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  16. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  17. Transformation of Words into Vocabulary

    Science.gov (United States)

    Parveen, H. Naseema; Rajan, Premalatha

    2012-01-01

    This article explores the significance of a word and the changes it undergoes in its form when it is placed in the hierarchy of grammatical constituents thereby forming a new word termed as vocabulary. This change or transformation is the result of affixations. Transformation becomes essential as the words learnt cannot be used as such in a…

  18. WORD OF THE MONTH: Etymology

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Etymology is the study of the history and origin of words and the way they' ve changed throughout history. The word etymology itself comes from two Greek words: "etumon" (which means "true sense" ), and "logia" (which means "study" ). The origin of words

  19. Word Recognition in Auditory Cortex

    Science.gov (United States)

    DeWitt, Iain D. J.

    2013-01-01

    Although spoken word recognition is more fundamental to human communication than text recognition, knowledge of word-processing in auditory cortex is comparatively impoverished. This dissertation synthesizes current models of auditory cortex, models of cortical pattern recognition, models of single-word reading, results in phonetics and results in…

  20. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  1. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  2. 44 CFR 334.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Definitions. 334.4 Section 334.4 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND... security emergency is any occurrence, including natural disaster, military attack, technological...

  3. Skipped words and fixated words are processed differently during reading.

    Science.gov (United States)

    Eskenazi, Michael A; Folk, Jocelyn R

    2015-04-01

    The purpose of this study was to investigate whether words are processed differently when they are fixated during silent reading than when they are skipped. According to a serial processing model of eye movement control (e.g., EZ Reader) skipped words are fully processed (Reichle, Rayner, Pollatsek, Behavioral and Brain Sciences, 26(04):445-476, 2003), whereas in a parallel processing model (e.g., SWIFT) skipped words do not need to be fully processed (Engbert, Nuthmann, Richter, Kliegl, Psychological Review, 112(4):777-813, 2005). Participants read 34 sentences with target words embedded in them while their eye movements were recorded. All target words were three-letter, low-frequency, and unpredictable nouns. After the reading session, participants completed a repetition priming lexical decision task with the target words from the reading session included as the repetition prime targets, with presentation of those same words during the reading task acting as the prime. When participants skipped a word during the reading session, their reaction times on the lexical decision task were significantly longer (M = 656.42 ms) than when they fixated the word (M = 614.43 ms). This result provides evidence that skipped words are sometimes not processed to the same degree as fixated words during reading.

  4. Statistical Laws Governing Fluctuations in Word Use from Word Birth to Word Death

    CERN Document Server

    Petersen, Alexander M; Havlin, Shlomo; Stanley, H Eugene

    2011-01-01

    How often a given word is used, relative to other words, can convey information about the word's linguistic utility. Using Google word data for 3 languages over the 209-year period 1800-2008, we found by analyzing word use an anomalous recent change in the birth and death rates of words, which indicates a shift towards increased levels of competition between words as a result of new standardization technology. We demonstrate unexpected analogies between the growth dynamics of word use and the growth dynamics of economic institutions. Our results support the intriguing concept that a language's lexicon is a generic arena for competition which evolves according to selection laws that are related to social, technological, and political trends. Specifically, the aggregate properties of language show pronounced differences during periods of world conflict, e.g. World War II.

  5. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  6. Learning the language of time: Children's acquisition of duration words.

    Science.gov (United States)

    Tillman, Katharine A; Barner, David

    2015-05-01

    Children use time words like minute and hour early in development, but take years to acquire their precise meanings. Here we investigate whether children assign meaning to these early usages, and if so, how. To do this, we test their interpretation of seven time words: second, minute, hour, day, week, month, and year. We find that preschoolers infer the orderings of time words (e.g., hour>minute), but have little to no knowledge of the absolute durations they encode. Knowledge of absolute duration is learned much later in development - many years after children first start using time words in speech - and in many children does not emerge until they have acquired formal definitions for the words. We conclude that associating words with the perception of duration does not come naturally to children, and that early intuitive meanings of time words are instead rooted in relative orderings, which children may infer from their use in speech. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Definitely Life but not Definitively

    Science.gov (United States)

    Oliver, Joan D.; Perry, Randall S.

    2006-12-01

    Although there have been attempts at a definition of life from many disciplines, none is accepted by all as definitive. Some people believe that it is impossible to define ‘life’ adequately at the moment. We agree with this point of view on linguistic grounds, examining the different types of definition, the contexts in which they are used and their relative usefulness as aids to arriving at a scientific definition of life. We look at some of the more recent definitions and analyse them in the light of our criteria for a good definition. We argue that since there are so many linguistic and philosophical difficulties with such a definition of life, what is needed is a series of working descriptions, which are suited to the audience and context in which they are used and useful for the intended purpose. We provide some ideas and examples of the forms these may take.

  8. Developing a Framework for Analyzing Definitions: A Study of "The Feynman Lectures"

    Science.gov (United States)

    Wong, Chee Leong; Chu, Hye-Eun; Yap, Kueh Chin

    2014-01-01

    One important purpose of a definition is to explain the meaning of a word. Any problems associated with a definition may impede students' learning. However, research studies on the definitional problems from the perspective of physics education are limited. Physics educators may not be aware of the nature and extent of definitional problems.…

  9. Word Learning: An ERP Investigation of Word Experience Effects on Recognition and Word Processing

    Science.gov (United States)

    Balass, Michal; Nelson, Jessica R.; Perfetti, Charles A.

    2010-01-01

    Adults of varying reading comprehension skill learned a set of previously unknown rare English words (e.g., "gloaming") in three different learning conditions in which the type of word knowledge was manipulated. The words were presented in one of three conditions: (1) orthography-to-meaning (no phonology); (2) orthography-to-phonology (no…

  10. Word learning: An ERP investigation of word experience effects on recognition and word processing

    NARCIS (Netherlands)

    Balass, M.; Perfetti, C.A.; Nelson, J.R.

    2010-01-01

    Adults of varying reading comprehension skill learned a set of previously unknown rare English words (e.g., gloaming) in three different learning conditions in which the type of word knowledge was manipulated. The words were presented in one of three conditions: (1) orthography-to-meaning (no phonol

  11. English words structure, history, usage

    CERN Document Server

    Katamba, Francis

    2015-01-01

    How do we find the right word for the job? Where does that word come from? Why do we spell it like that? And how do we know what it means? Words are all around us - we use them every day to communicate our joys, fears, hopes, opinions, wishes and demands - but we don't often think about them too deeply. In this highly accessible introduction to English words, the reader will discover what the study of words can tell them about the extraordinary richness and complexity of our daily vocabulary and about the nature of language in general. Assuming no prior knowledge of linguistics, the book covers a wide range of topics, including the structure of words, the meaning of words, how their spelling relates to pronunciation, how new words are manufactured or imported from other languages, and how the meaning of words changes with the passage of time. It also investigates how the mind deals with words by highlighting the amazing intellectual feat performed routinely when the right word is retrieved from the mental dic...

  12. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  13. WordPress for dummies

    CERN Document Server

    Sabin-Wilson, Lisa

    2014-01-01

    The bestselling WordPress guide, fully updated to cover the 2013 enhancements WordPress has millions of users, and this popular guide has sold more than 105,000 copies in its previous editions. With the newest releases of WordPress, author and WordPress expert Lisa Sabin-Wilson has completely updated the book to help you use and understand all the latest features. You'll learn about both the hosted WordPress.com version and the more flexible WordPress.org, which requires third-party hosting. Whether you're switching to WordPress from another blogging platform or just beginning to blog, you'll

  14. Chinese Affixes and Word Formation

    Directory of Open Access Journals (Sweden)

    Fu Ruomei

    2014-05-01

    Full Text Available Chinese language is one of the typical isolated languages. It lacks morphological variation; part of speech has no morphological signs; the additional component of word formation is less; and the roots never change their forms. The major method of Chinese word formation is the combination of roots according to certain grammatical relations. Although the affix word formation is not part of mainstream Chinese word formation, affix-formation is still an integral part of the Chinese word-formation. Article used literature review, summarized the types and meanings of Chinese affixes. And meanwhile, article analyzed word formation function of Chinese Affixes and quasi-affixes. The Chinese quasi-affixes have stronger capabilities in forming new words, but development direction of Chinese quasi-affixes has to stand the test of time.

  15. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  16. Plagiarism: words and ideas.

    Science.gov (United States)

    Bouville, Mathieu

    2008-09-01

    Plagiarism is a crime against academy. It deceives readers, hurts plagiarized authors, and gets the plagiarist undeserved benefits. However, even though these arguments do show that copying other people's intellectual contribution is wrong, they do not apply to the copying of words. Copying a few sentences that contain no original idea (e.g. in the introduction) is of marginal importance compared to stealing the ideas of others. The two must be clearly distinguished, and the 'plagiarism' label should not be used for deeds which are very different in nature and importance.

  17. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  18. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  19. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  20. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  1. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  2. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  3. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  4. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  5. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  6. From word superiority to word inferiority: Visual processing of letters and words in pure alexia

    DEFF Research Database (Denmark)

    Habekost, Thomas; Petersen, Anders; Behrmann, Marlene

    2014-01-01

    tasks for all patients, and this pattern was more pronounced in the more severely affected patients. The relationship between performance with single letters and words was, however, not straightforward: One patient performed within the normal range on the letter perception task, while being severely...... impaired in letter naming and word processing, and performance with letters and words was dissociated in all four patients, with word reading being more severely impaired than letter recognition. This suggests that the word reading deficit in pure alexia may not be reduced to an impairment in single letter...

  7. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  8. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  9. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  10. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  11. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  12. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  15. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  16. Fast correlation attack on stream cipher ABC v3

    Institute of Scientific and Technical Information of China (English)

    ZHANG HaiNa; LI Lin; WANG XiaoYun

    2008-01-01

    ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase.Its key length is 128 bits.In this paper,we find large numbers of new weak keys of ABC family and introduce a method to search for them,and then apply a fast correlation attack to break ABC v3 with weak keys.We show that there are at least 2103.71 new weak keys in ABC v3.Recovering the internal state of a weak key requires 236.05 keystream words and 250.56 operations.The attack can be applied to ABC v1 and v2 with the same complexity as that of ABC v3.However,the number of weak keys of ABC v1 as well as ABC v2 decreases to 297+295.19.It reveals that ABC v3 incurs more weak keys than that of ABC v1 and v2.

  17. Mortality and management of 96 shark attacks and development of a shark bite severity scoring system.

    Science.gov (United States)

    Lentz, Ashley K; Burgess, George H; Perrin, Karen; Brown, Jennifer A; Mozingo, David W; Lottenberg, Lawrence

    2010-01-01

    Humans share a fascination and fear of sharks. We predict that most shark attacks are nonfatal but require skilled, timely medical intervention. The development of a shark bite severity scoring scale will assist communication and understanding of such an injury. We retrospectively reviewed records of the prospectively maintained International Shark Attack File (ISAF) at the University of Florida. The ISAF contains 4409 investigations, including 2979 documented attacks, 96 of which have complete medical records. We developed a Shark-Induced Trauma (SIT) Scale and calculated the level of injury for each attack. Medical records were reviewed for the 96 documented shark attack victims since 1921. Calculated levels of injury in the SIT Scale reveal 40 Level 1 injuries (41.7%), 16 Level 2 injuries (16.7%), 18 Level 3 injuries (18.8%), 14 Level 4 injuries (14.6%), and eight Level 5 injuries (8.3%). The overall mortality of shark attacks was 8.3 per cent. However, SIT Scale Level 1 injuries comprised the greatest percentage of cases at 41.7 per cent. Injury to major vascular structures increases mortality and necessitates immediate medical attention and definitive care by a surgeon. Shark bites deserve recognition with prompt resuscitation, washout, débridement, and follow up for prevention of infection and closure of more complex wounds.

  18. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  19. Brain activation during word identification and word recognition

    DEFF Research Database (Denmark)

    Jernigan, Terry L.; Ostergaard, Arne L.; Law, Ian

    1998-01-01

    dramatically alter the degree to which word priming shows a dissociation from word recognition; i.e., effects of a number of factors on priming paralleled their effects on recognition memory tests when the words were degraded at test. In the present study, cerebral blood flow changes were measured while...... subjects performed the word identification (reading) and recognition memory tasks used previously by Ostergaard. The results are the direct comparisons of the two tasks and the effects of stimulus degradation on blood flow patterns during the tasks. Clear differences between word identification and word...... recognition were observed: the latter task evoked considerably more prefrontal activity and stronger cerebellar activation. Stimulus degradation was associated with focal increases in bilateral fusiform regions within the occipital lobe. No task, degradation, or item repetition effects were demonstrated...

  20. From switch-words to stitch-words.

    Science.gov (United States)

    Litowitz, Bonnie

    2014-02-01

    During the course of treatment with some patients a word or phrase reappears that functions to connect layers of fantasies and to identify a history of conflicts and defenses. These stitch-words are compared to the switch-words proposed by Freud as points of condensation in dreams, as well as to other forms of idiolectic evidence (e.g. metaphors) that inform therapeutic listening. Stitch-words expand on Freud's concept by taking into account syntactic aspects of language that function to hold together layers of unconscious fantasies. A description of the grammatical type of words (syncategorematic) best suited to function as stitch-words is presented and illustrated by their use in two clinical examples ('normal', 'fair'). The therapeutic value of listening to, as well as through, the surface of patients' language is discussed. Copyright © 2013 Institute of Psychoanalysis.

  1. Grounding word learning in space.

    Directory of Open Access Journals (Sweden)

    Larissa K Samuelson

    Full Text Available Humans and objects, and thus social interactions about objects, exist within space. Words direct listeners' attention to specific regions of space. Thus, a strong correspondence exists between where one looks, one's bodily orientation, and what one sees. This leads to further correspondence with what one remembers. Here, we present data suggesting that children use associations between space and objects and space and words to link words and objects--space binds labels to their referents. We tested this claim in four experiments, showing that the spatial consistency of where objects are presented affects children's word learning. Next, we demonstrate that a process model that grounds word learning in the known neural dynamics of spatial attention, spatial memory, and associative learning can capture the suite of results reported here. This model also predicts that space is special, a prediction supported in a fifth experiment that shows children do not use color as a cue to bind words and objects. In a final experiment, we ask whether spatial consistency affects word learning in naturalistic word learning contexts. Children of parents who spontaneously keep objects in a consistent spatial location during naming interactions learn words more effectively. Together, the model and data show that space is a powerful tool that can effectively ground word learning in social contexts.

  2. Effects of Focus and De?niteness on Children's Word Order: Evidence from German Five-Year-Olds' Reproductions of Double Object Constructions

    Science.gov (United States)

    Höhle, Barbara; Hörnig, Robin; Weskott, Thomas; Knauf, Selene; Krüger, Agnes

    2014-01-01

    Two experiments tested how faithfully German children aged 4;5 to 5;6 reproduce ditransitive sentences that are unmarked or marked with respect to word order and focus (Exp1) or definiteness (Exp2). Adopting an optimality theory (OT) approach, it is assumed that in the German adult grammar word order is ranked lower than focus and definiteness.…

  3. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  4. Word length effects on novel words: evidence from eye movements.

    Science.gov (United States)

    Lowell, Randy; Morris, Robin K

    2014-01-01

    The present study investigated the effects of word length on eye movement behavior during initial processing of novel words while reading. Adult skilled readers' eye movements were monitored as they read novel or known target words in sentence frames with neutral context preceding the target word. Comparable word length effects on all single-fixation measures for novel and known words suggested that both types of words were subject to similar initial encoding strategies. The impact of the absence of an existing lexical entry emerged in multiple first-pass fixation measures in the form of interactions between word length (long and short) and word type (novel and known). Specifically, readers spent significantly more first-pass time refixating long novel targets than short novel targets; however, the first-pass time spent refixating known controls did not differ as a function of length. Implications of these findings for models of eye movement control while reading, as well as for vocabulary acquisition in reading, are discussed.

  5. Estimating affective word covariates using word association data.

    Science.gov (United States)

    Van Rensbergen, Bram; De Deyne, Simon; Storms, Gert

    2016-12-01

    Word ratings on affective dimensions are an important tool in psycholinguistic research. Traditionally, they are obtained by asking participants to rate words on each dimension, a time-consuming procedure. As such, there has been some interest in computationally generating norms, by extrapolating words' affective ratings using their semantic similarity to words for which these values are already known. So far, most attempts have derived similarity from word co-occurrence in text corpora. In the current paper, we obtain similarity from word association data. We use these similarity ratings to predict the valence, arousal, and dominance of 14,000 Dutch words with the help of two extrapolation methods: Orientation towards Paradigm Words and k-Nearest Neighbors. The resulting estimates show very high correlations with human ratings when using Orientation towards Paradigm Words, and even higher correlations when using k-Nearest Neighbors. We discuss possible theoretical accounts of our results and compare our findings with previous attempts at computationally generating affective norms.

  6. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  7. WORD OF MOUTH – FROM VERBALLY COMMUNICATION TO COMMUNICATION ONLINE

    Directory of Open Access Journals (Sweden)

    Ana Raluca CHIOSA

    2014-11-01

    Full Text Available The Internet has become essential in linking the brand with consumers. This enables them to share their opinions, preferences or experiences with others. The paper seeks to provide the concept of word-of-mouth, starting from the definition, characteristics, to manifestation in the online environment and the effects on consumer behavior, creating opportunities for word-of-mouth marketing. Social Media become important in building a brand, as consumer reactions can be decisive in enhancing or destroying it. For effective use of social media tools, brands need to identify the influential people among consumers, to capture the recommendations received from the users and measure their impact.

  8. The Causes and the Future of New Chinese Internet Words that Deriving from Regional Dialects

    Institute of Scientific and Technical Information of China (English)

    董楠楠

    2015-01-01

    In the recent two decades, the computer industry and internet business have significant development all over the world which provide a cradle for the coming of new Chinese Internet words. Many scholars have studied this new group of word as a whole or just some specific parts of it. This paper will give the term, weblect(网络方言), a definition after it was raised by Professor Hou guojin. Meanwhile it will focus on new Chinese Internet words that come from regional dialects, analyzing the causes of their emerging and popularizing. In addition, this term paper will predict its future after describing the impacts these words brought to mandarin Chinese.

  9. WordPress For Dummies

    CERN Document Server

    Sabin-Wilson, Lisa

    2011-01-01

    The bestselling guide to WordPress, fully updated to help you get your blog going! Millions of bloggers rely on WordPress, the popular, free blogging platform. This guide covers all the features and improvements in the most up-to-date version of WordPress. Whether you are switching to WordPress from another blogging platform or just starting your first blog, you'll find the advice in this friendly guide gets you up to speed on both the free-hosted WordPress.com version and WordPress.org, which requires the purchase of web hosting services, and figure out which version is best for you. You'll b

  10. Words Do Come Easy (Sometimes)

    DEFF Research Database (Denmark)

    Starrfelt, Randi; Petersen, Anders; Vangkilde, Signe Allerup

    multiple stimuli are presented simultaneously: Are words treated as units or wholes in visual short term memory? Using methods based on a Theory of Visual Attention (TVA), we measured perceptual threshold, visual processing speed and visual short term memory capacity for words and letters, in two simple...... psychophysical experiments. Using briefly presented single stimuli (words and letters), we show that the classical WSE is specifically reflected in perceptual processing speed: words are simply processed faster than single letters. Intriguingly, when multiple stimuli are presented simultaneously we find...... a different pattern: Letters are perceived more easily than words, and this is reflected both in perceptual processing speed and short term memory capacity. So even if single words do come easy, they seem to enjoy no advantage in visual short term memory....

  11. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  12. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  14. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  15. Words Used in English Advertisement

    Institute of Scientific and Technical Information of China (English)

    梁超慧; 郭星余

    2008-01-01

    With the support of some pieces of English advertisement,express the general principles used in the written language of English advertisement,based on the characteristic of advertisement.In the passage,adjective,verb,pronoun,compound word,coinage and connotative word are analyzed to find the basic rules of words used in English advertisement,which can be used to guise the choice of language in advertisements.

  16. Slang Word Identification on Twitter

    OpenAIRE

    Rushabh Shroff; Amitash Ramesh

    2016-01-01

    It is commonly known that people use different words to refer to the same things. We aim to find such similar words and classify their usage based on location. We believe this can have multiple real world usage. Such analysis could help linguistic scientists and aid in linguistic training. If a beverage selling company needed to advertise their product, they could tailor their advertisements to use words based on the map above to connect better with the audience so this d...

  17. Chinese Loan Words in English

    Institute of Scientific and Technical Information of China (English)

    郜战莹

    2015-01-01

    English language is the most common working language.In the history of its development,English has widened its vocabulary by borrowing.Borrowing plays an important role in the formation of modern English.Chinese loan words are a part in the family of all the loan words.Therefore,the number of loan words which originate from Chinese is not that great,but they hold an important role in contemporary English.

  18. Identification of Physiological Race Nematode, Radopholus similisCobb. that Attack Coffee Trees

    Directory of Open Access Journals (Sweden)

    Retno Hulupi

    2006-12-01

    Full Text Available Physiological races of Radopholus similis Cobb., the burrowing nematode that attack coffee trees have never been reported yet, while two physiological races have been identified, i.e. banana and citrus races. Banana and citrus are commonly used as the shading trees or crop diversification in coffee plantation. Therefore, both races have to be analyzed whether the same as the race that attacking the coffee plants. Research to investigate the physiological race of R. similis Cobb. had been conducted in the screen house at Indonesian Coffee and Cocoa Research Institute, Jember. The experiment was arranged in randomized complete design with three replications, while cross inoculation tests were used as race identification method, by using three isolates from banana, citrus and Arabica coffee as the control. Tested host plants were banana Cavendish, ‘Ambon Kuning’ and ‘Raja’ varieties, rootstock of citrus Siam from Kintamani and Arabica coffee Kartika 1 variety. The expression of virulence of three nematode isolates against banana, citrus or arabica coffee tested to be considered as favorable host, while the most virulent isolate attacked coffee could be decided as physiological race of coffee. Results showed that banana isolate penetrated and attacked the roos of arabica coffee. The isolate of R. similis from citrus could not attack both coffee and banana varieties. Therefore, the physiological race of coffee was considered similar with the banana race. It was possible that the physiological race was specific race but it could attacke banana as other favorable host, however, it could not be proven in this results. Based on this results, the use of Musa sp.as intercrop or shade tree in coffee plantation has more risk to nematode attack than that of Citrus sp. Key words: physiological race, Radopholus similis, coffee, banana, citrus, nematode.

  19. Words and possible words in early language acquisition.

    Science.gov (United States)

    Marchetto, Erika; Bonatti, Luca L

    2013-11-01

    In order to acquire language, infants must extract its building blocks-words-and master the rules governing their legal combinations from speech. These two problems are not independent, however: words also have internal structure. Thus, infants must extract two kinds of information from the same speech input. They must find the actual words of their language. Furthermore, they must identify its possible words, that is, the sequences of sounds that, being morphologically well formed, could be words. Here, we show that infants' sensitivity to possible words appears to be more primitive and fundamental than their ability to find actual words. We expose 12- and 18-month-old infants to an artificial language containing a conflict between statistically coherent and structurally coherent items. We show that 18-month-olds can extract possible words when the familiarization stream contains marks of segmentation, but cannot do so when the stream is continuous. Yet, they can find actual words from a continuous stream by computing statistical relationships among syllables. By contrast, 12-month-olds can find possible words when familiarized with a segmented stream, but seem unable to extract statistically coherent items from a continuous stream that contains minimal conflicts between statistical and structural information. These results suggest that sensitivity to word structure is in place earlier than the ability to analyze distributional information. The ability to compute nontrivial statistical relationships becomes fully effective relatively late in development, when infants have already acquired a considerable amount of linguistic knowledge. Thus, mechanisms for structure extraction that do not rely on extensive sampling of the input are likely to have a much larger role in language acquisition than general-purpose statistical abilities. Copyright © 2013. Published by Elsevier Inc.

  20. Translating Words, Translating Cultures

    Directory of Open Access Journals (Sweden)

    Richard Whitaker

    2012-03-01

    Full Text Available What exactly does (or should translation from one language into another try to do? Attempt to convey to readers of the target language (the language into which one is translating something of the strangeness, difference and historicity of the original in the source language (the language from which one is translating? Or must translation try to bridge the gap between source and target language, by rendering the original in a thoroughly contemporary style and diction, as if this were a work being written now for the first time? And related to these the further questions: how closely should a translation render the genre, language, metre, style and content of the original? How far can a translation depart from the original without ceasing to be a translation – in other words, where is one to situate the border between “translation”, “version” and “adaptation”?

  1. Use your words!

    Science.gov (United States)

    Shapiro, Theodore

    2004-01-01

    "Use your words!" is a phrase admonishing preschoolers to divert their action-proneness to thought and language. Freud's injunction against acting out had a similar aim, placing control over drives in the domain of "inner language." The twenty-first-century psychoanalyst continues to employ models that depend on mentalization viewed from two angles-neural inhibition and social discourse. Psychoanalysts bolster their position by borrowing from the basic scientific work in each area. The recent focus on enactments, intersubjectivity, and social constructivism is reconsidered from an historical vantage point, as is the work that seeks to reconcile recent findings in neuroimaging and cognitive neuroscience. Freud's vision included a holistic hope that a comprehensive science of human beings might be achieved by understanding derived from biological inquiry and the artifacts of social and cultural narratives. The author's experience in both domains is recounted, and a new reconciliation of disparate approaches is offered in linguistic complementarity.

  2. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  3. WordPress Top Plugins

    CERN Document Server

    Corbin, Brandon

    2010-01-01

    Time flies when you're having fun. This is the right way to describe this WordPress Top Plugins book by Brandon Corbin. With real world examples and by showing you the perks of having these plugins installed on your websites, the author is all set to captivate your interest from start to end. Regardless of whether this is your first time working with WordPress, or you're a seasoned WordPress coding ninja, WordPress Top Plugins will walk you through finding and installing the best plugins for generating and sharing content, building communities and reader base, and generating real advertising r

  4. Words Do Come Easy (Sometimes)

    DEFF Research Database (Denmark)

    Starrfelt, Randi; Petersen, Anders; Vangkilde, Signe Allerup

    multiple stimuli are presented simultaneously: Are words treated as units or wholes in visual short term memory? Using methods based on a Theory of Visual Attention (TVA), we measured perceptual threshold, visual processing speed and visual short term memory capacity for words and letters, in two simple...... a different pattern: Letters are perceived more easily than words, and this is reflected both in perceptual processing speed and short term memory capacity. So even if single words do come easy, they seem to enjoy no advantage in visual short term memory....

  5. Beginning WordPress 3

    CERN Document Server

    Leary, Stephanie

    2009-01-01

    One of the most popular open source blogging and content management systems, WordPress lets you create a website to promote yourself or your business quickly and easilyi' "and better yet, it's free. WordPress is a flexible, user-friendly system, and it can be extended with a variety of themes and plugins. Beginning WordPress 3 is a complete guide for the beginning developer who wants to start using WordPress. You'll learn how to publish and manage online content, add media, create widgets and plugins, and much more. What you'll learn * How to get started with Wordpress, create new content

  6. Retrieving words from their "meanings"

    OpenAIRE

    Durgar El-Kahlout, İlknur; Durgar El-Kahlout, Ilknur

    2003-01-01

    The human brain is the best memory that can record and keep a huge number of information for a long time. Words, their meanings, domains, relationships between different words, and the grammars of languages are well organized in the linguistic component of brain. While speaking or writing, we can generally express our thoughts and feelings by words without thinking for a long time what the correct words can be. But, sometimes things do not go like clockwork even for human brain. In our daily ...

  7. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  8. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  9. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  10. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  11. The Study of the word 'Dahyu'

    Directory of Open Access Journals (Sweden)

    معینی سام معینی سام

    2009-12-01

    Full Text Available Since the roots of many Persian words are unclear, a researcher should study the vocalic evolution of these words to get to the root. The word Dahyu is one of these words. From Indo-European period to modern Persian, this word has had many different meanings. The writer of this article, studies the different meanings of this word. To reach to the earlier form of the word, the writer has studied the history of the word, from its Indo-European form to modern Persian. In the end, the writer has constructed the most probable root for this word. Key Words: Dahyu, Dasyu, Avesta, Yasht, Old Persian.

  12. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  13. Words as Things: Development of Word Concept by Bilingual Children.

    Science.gov (United States)

    Bialystok, Ellen

    1987-01-01

    The development of the concept of word is discussed in terms of specific advantages that might be available to bilingual children when compared with their monolingual peers. Three studies are reviewed in which bilingual children show more advanced understanding of some aspects of the concept of word than do monolingual children (Author/LMO)

  14. Word Stress in German Single-Word Reading

    Science.gov (United States)

    Beyermann, Sandra; Penke, Martina

    2014-01-01

    This article reports a lexical-decision experiment that was conducted to investigate the impact of word stress on visual word recognition in German. Reaction-time latencies and error rates of German readers on different levels of reading proficiency (i.e., third graders and fifth graders from primary school and university students) were compared…

  15. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  16. The effect of high- and low-frequency previews and sentential fit on word skipping during reading

    Science.gov (United States)

    Angele, Bernhard; Laishley, Abby; Rayner, Keith; Liversedge, Simon P.

    2014-01-01

    In a previous gaze-contingent boundary experiment, Angele and Rayner (2012) found that readers are likely to skip a word that appears to be the definite article the even when syntactic constraints do not allow for articles to occur in that position. In the present study, we investigated whether the word frequency of the preview of a three-letter target word influences a reader’s decision to fixate or skip that word. We found that the word frequency rather than the felicitousness (syntactic fit) of the preview affected how often the upcoming word was skipped. These results indicate that visual information about the upcoming word trumps information from the sentence context when it comes to making a skipping decision. Skipping parafoveal instances of the therefore may simply be an extreme case of skipping high-frequency words. PMID:24707791

  17. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  18. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  19. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  20. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  2. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  3. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  4. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  5. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  6. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  7. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  8. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  9. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  10. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  11. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  12. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  13. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  14. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  15. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  16. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  17. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  18. Words translated in sentence contexts produce repetition priming in visual word comprehension and spoken word production.

    Science.gov (United States)

    Francis, Wendy S; Camacho, Alejandra; Lara, Carolina

    2014-10-01

    Previous research with words read in context at encoding showed little if any long-term repetition priming. In Experiment 1, 96 Spanish-English bilinguals translated words in isolation or in sentence contexts at encoding. At test, they translated words or named pictures corresponding to words produced at encoding and control words not previously presented. Repetition priming was reliable in all conditions, but priming effects were generally smaller for contextualized than for isolated words. Repetition priming in picture naming indicated priming from production in context. A componential analysis indicated priming from comprehension in context, but only in the less fluent language. Experiment 2 was a replication of Experiment 1 with auditory presentation of the words and sentences to be translated. Repetition priming was reliable in all conditions, but priming effects were again smaller for contextualized than for isolated words. Priming in picture naming indicated priming from production in context, but the componential analysis indicated no detectable priming for auditory comprehension. The results of the two experiments taken together suggest that repetition priming reflects the long-term learning that occurs with comprehension and production exposures to words in the context of natural language.

  19. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. Neuroretinitis -- definition

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/007624.htm Neuroretinitis - definition To use the sharing features on this page, ... this important distinction for online health information and services. Learn more about A.D.A.M.'s editorial ...

  2. Advances in the Management of Transient Ischaemic Attack and Stroke

    Directory of Open Access Journals (Sweden)

    Mayra J Montalvo

    2016-07-01

    Full Text Available Among many important advances in the management of transient ischaemic attack (TIA and stroke are: the updated definition of TIA; risk stratification scores for TIA; the urgent diagnostic and treatment process for TIA; thrombectomy treatment for large vessel occlusive ischaemic stroke; cryptogenic stroke evaluation and treatment, including long-term monitoring for paroxysmal atrial fibrillation; and strategies to improve outcomes for patients including mirror therapy for neglect and timing of mobilisation after stroke. Future research will focus on: antiplatelet strategies after TIA; selecting patients for treatment with recanalisation therapies in an extended time window; uncovering the cause of strokes previously defined as cryptogenic; and better defining the optimal timing and dose of mobilisation after stroke.

  3. Automatic Identification of Support Verbs A Step Towards a Definition of Semantic Weight

    CERN Document Server

    Dras, M

    1995-01-01

    Current definitions of notions of lexical density and semantic weight are based on the division of words into closed and open classes, and on intuition. This paper develops a computationally tractable definition of semantic weight, concentrating on what it means for a word to be semantically light; the definition involves looking at the frequency of a word in particular syntactic constructions which are indicative of lightness. Verbs such as "make" and "take", when they function as support verbs, are often considered to be semantically light. To test our definition, we carried out an experiment based on that of Grefenstette and Teufel (1995), where we automatically identify light instances of these words in a corpus; this was done by incorporating our frequency-related definition of semantic weight into a statistical approach similar to that of Grefenstette and Teufel. The results show that this is a plausible definition of semantic lightness for verbs, which can possibly be extended to defining semantic ligh...

  4. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  5. Combining Knowledge- and Corpus-based Word-Sense-Disambiguation Methods

    CERN Document Server

    Montoyo, A; Rigau, G; Suarez, A; 10.1613/jair.1529

    2011-01-01

    In this paper we concentrate on the resolution of the lexical ambiguity that arises when a given word has several different meanings. This specific task is commonly referred to as word sense disambiguation (WSD). The task of WSD consists of assigning the correct sense to words using an electronic dictionary as the source of word definitions. We present two WSD methods based on two main methodological approaches in this research area: a knowledge-based method and a corpus-based method. Our hypothesis is that word-sense disambiguation requires several knowledge sources in order to solve the semantic ambiguity of the words. These sources can be of different kinds--- for example, syntagmatic, paradigmatic or statistical information. Our approach combines various sources of knowledge, through combinations of the two WSD methods mentioned above. Mainly, the paper concentrates on how to combine these methods and sources of information in order to achieve good results in the disambiguation. Finally, this paper presen...

  6. Words or meaning?

    Directory of Open Access Journals (Sweden)

    John Dodds

    2015-12-01

    Full Text Available Abstract - In the following pages, a brief, personal outline of the history of translation is sketched, so as to determine the whys and wherefores of the form/content dichotomy that seems to be plaguing translators and translation theorists incessantly. From the outset, in Classical times, sense rules supreme. In the late middle ages with the advent of Bible translation in Europe, the word – being the word of God – assumes new-found importance, especially as any deviation from it implies heresy. With Neo-Classicism and the Age of Enlightenment, the original tenets of antiquity unsurprisingly make their comeback, though somewhat short-lived this time. With the Romantics and post-Romantics, foreign lands and cultures gain ever greater interest, as indeed do their various forms of expressions. In contemporary Europe, over the last hundred years or so, with its preoccupation for markets and product diversification, the two schools of thought seem to co-habit quite comfortably, notwithstanding modern linguistic theory that renders form and content into indivisible components of language, thus making the dichotomy fatuous. Riassunto - Nelle pagine seguenti si delinea brevemente una traccia personale della storia della traduzione in modo da determinare i motivi della dicotomia forma/contenuto che pare affliggere costantemente i traduttori e teorici della traduzione. Fin dall'inizio dell’epoca classica, il senso regna sovrano. La parola è considerata spesso niente più di un veicolo modesto per la sublimità del pensiero. Soltanto nel tardo medioevo, con l'avvento della traduzione della Bibbia in Europa, la parola,essendo la parola di Dio, assume una nuova importanza, in quanto ogni deviazione da essa significa un’eresia. Con il Neoclassicismo e l’Illuminismo non sorprende che i principi originali dell'antichità facciano ritorno, anche se solo per breve tempo. Con il Romanticismo e il post-Romanticismo, cresce l’interesse per le

  7. Market Definition

    OpenAIRE

    Kaplow, Louis

    2014-01-01

    Market definition has long held a central place in competition law. This entry surveys recent analytical work that has called the market definition paradigm into question on a number of fronts: whether the process is feasible, whether market share threshold tests are coherent, whether the hypothetical monopolist test in merger guidelines is counterproductive, and whether and when the frequent focus on cross-elasticities is useful.

  8. ELECTRONIC WORD OF MOUTH: HOW MUCH DO WE KNOW?

    Directory of Open Access Journals (Sweden)

    Mihaela ABĂLĂESEI

    2014-12-01

    Full Text Available Since the development of Web 2.0 (or social media sites such as Facebook, Twitter, Blogger, and various forums and communities, online users from all over the world have been exposed to a completely new means of information sharing: electronic word of mouth (e-WOM. Due to the fact that it is a recent research phenomenon, its definition is difficult to be phrased and similar to traditional word-of-mouth, the theoretical framework of e-WOM is not very clear. This complex concept is linked to viral marketing, user generated content, stealth marketing, opinion sharing, decision making and other aspects. Considering the multiple areas that e-WOM has an influence on, this article presents an overview of what has been researched with respect to this subject. Using the findings of this paper, it may be possible to set up the base of a conceptual model to measure electronic word of mouth.

  9. Formulation of Word Problems in Geometry by Gifted Pupils

    Directory of Open Access Journals (Sweden)

    Ilana LEVENBERG

    2014-12-01

    Full Text Available This study investigated the ability level of talented and gifted pupils to define selected geometry terms and formulate a word problem for each of them. In order to perform this task correctly, pupils should be acquainted with the geometry term. Moreover, they must have at last experience in solving word problems. The research population consisted of 58 pupils from the 4th-6th grades who learn mathematics in a course which is adjusted to their high ability level. The research findings illustrate a medium level of mastery of the term definition knowledge. The formulated word problems were mainly taken from the pupils' previous experience and they are at the first level according to van Hiele. Only few pupils demonstrated creativity and write problems which were not similar to the ones they knew from the textbooks.

  10. Head First WordPress

    CERN Document Server

    Siarto, Jeff

    2010-01-01

    Whether you're promoting your business or writing about your travel adventures, Head First WordPress will teach you not only how to make your blog look unique and attention-grabbing, but also how to dig into the more complex features of WordPress 3.0 to make your website work well, too. You'll learn how to move beyond the standard WordPress look and feel by customizing your blog with your own URL, templates, plugin functionality, and more. As you learn, you'll be working with real WordPress files: The book's website provides pre-fab WordPress themes to download and work with as you follow al

  11. Definition of Intellectual Disability in Criminal Court Cases

    Science.gov (United States)

    Olley, J. Gregory

    2013-01-01

    Definitions and associated descriptions of the condition now commonly known as "intellectual disability" serve many functions. The "Atkins v. Virginia" U.S. Supreme Court decision (2002) has called attention to the importance of clear, objective, and measureable wording of the definition. This article discusses the potential for misunderstanding…

  12. Abstracts and Key Words

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Religion, State and Civil Religion: Assumption and Practice of Confucian Religion in the Course of Nation-state Construction CAN Chun-song Abstract: In late Qing Dynasty and the early years of the Republic of China, Kang You-wei made a proposal to set Confucian religion as state religion. After analyzing carefully Kang's related texts, however, it can be shown that Kang had unique understandings of "religion" and "state religion". Kang defined Confucianism as religion in the sense of cultivation, and emphasized that the function of Confucianism was moral education. Kang's understanding of "state religion" aims to conserve Chinese traditional cultures and customs, shape the identity of nation-state, and enhance the state's cohesion. In this sense, Kang's definition of "national religion" is similar to to Bellah's "civil religion".

  13. 40 CFR 35.905 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.905 Definitions. As used in this subpart, the following words and terms mean: Act. The Clean Water Act (33 U.S.C. 1251 et seq., as amended... individual homes or buildings to a plant or facility where treatment of the waste water is accomplished;...

  14. 40 CFR 35.936-1 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.936-1 Definitions. As used in §§ 35.936 through 35.939, the following words and terms shall have the meaning set forth below....

  15. 18 CFR 806.3 - Definitions.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Definitions. 806.3 Section 806.3 Conservation of Power and Water Resources SUSQUEHANNA RIVER BASIN COMMISSION REVIEW AND... the context indicates otherwise, the words listed in this section are defined as follows:...

  16. 40 CFR 35.3105 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE State Water Pollution Control Revolving Funds § 35.3105 Definitions. Words and terms that are not... and 40 CFR part 35, subpart I. (a) Act. The Federal Water Pollution Control Act, more commonly known as the Clean Water Act (Pub. L. 92-500), as amended by the Water Quality Act of 1987 (Pub. L....

  17. 7 CFR 37.1 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... ASSESS ORGANIC CERTIFYING AGENCIES § 37.1 Definitions. Words used in this part in the singular form shall... accordance with the regulations that may result in assessment of an organic certification program...

  18. 7 CFR 94.301 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... back portions of poultry. Light meat. Refers to the skinless and deboned breast and wing portions of poultry. Poultry. Any kind of domesticated bird, including, but not limited to, chicken, turkey, duck... POULTRY AND EGG PRODUCTS Processed Poultry Products § 94.301 Definitions. Words used in the regulations...

  19. Presidents' words - Gianni Deroma

    CERN Document Server

    Staff Association

    2015-01-01

    Gianni Deroma This week we publish the last contributions in the 'Words of presidents' series by giving the floor to Gianni Deroma (2007-2010) and Michel Goossens (2011-2015). "Tu patere legem quam ipse fecisti" This Latin adage has marked my years with the Staff Association (SA). For someone like me, coming from the technical world, the discovery of the importance of the role played by legal matters in the defence of the staff illustrates a new reality and incarnates my years spent with the SA. We, members of personnel, as citizens have as reference the democratic societies in which we live. CERN is not a democracy. The Member States, the Director-General have full powers, or almost. Contrary to citizens of states, we do not elect our leaders. So in that context is it useful to have a Staff Association? Or does it only serve as a necessary alibi for those who have the power? This is where a legal approach makes sense, in counterbalancing the power of our governing ...

  20. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  1. The Psychology of Ongoing Threat: Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2007-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic "bull's eye" disaster models, which assume the…

  2. The Effect of High- and Low-Frequency Previews and Sentential Fit on Word Skipping during Reading

    Science.gov (United States)

    Angele, Bernhard; Laishley, Abby E.; Rayner, Keith; Liversedge, Simon P.

    2014-01-01

    In a previous gaze-contingent boundary experiment, Angele and Rayner (2013) found that readers are likely to skip a word that appears to be the definite article "the" even when syntactic constraints do not allow for articles to occur in that position. In the present study, we investigated whether the word frequency of the preview of a…

  3. CMS Security Handbook The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

    CERN Document Server

    Canavan, Tom

    2011-01-01

    Learn to secure Web sites built on open source CMSs Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you're responsible for one of them, this comprehensive security guide, the first of its kind, offers detailed guidance to help you prevent attacks, develop secure CMS-site operations, and restore your site if an attack does occur. You'll learn a strong, foundational approach to CMS operations and security from an expert in the field.More and more Web sites are being built on open source CMSs, making them a popular target, thus making you vulnerable t

  4. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  5. Executive function during transient ischemic attacks

    Institute of Scientific and Technical Information of China (English)

    Jianhua Zhao; Tong Li; Yanxia Liu; Ping Zhang; Haiqing Yan

    2007-01-01

    BACKGROUND: Recent researches demonstrate that damage of executive function is an early manifestation of vascular cognitive disorder.OBJECTIVE: To investigate the executive functions of patients with transient ischemic attack (TIA).DESIGN: Case control.SETTING: Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College.PARTICIPANTS: A total of 83 TIA patients (46 males and 37 females, aged 32 - 74 years) were selected from Department of Neurology, the First Affiliated Hospital of Xinxiang Medical College from July 2005 to December 2006. The diagnosis of TIA was established by the criteria of cerebrovascular diseases made by the Fourth National Cerebrovascular Disease Meeting. In these cases, forty-five patients (54%) were involved in internal carotid artery, and thirty-eight patients (46%) were involved in vertebral basilar system.Fifty healthy adults (Control group: 28 males and 22 females, aged 32 - 74 years) were chosen from retiree in community and family of patients. All of them were right-handedness, without cerebrovascular disease,cerebral trauma, inborn oligophrenia, and hearing and visual disorders; also they had no anxiety and depression nearly one week. In addition, all the subjects cooperated with examination.METHODS: After TIA diagnosis, all patients received neuropsychological examination, including attention and inhibition, working memory, flexibility, planning and diversion, based on Stroop tests (C and CW) and the Wisconsin card sorting tests (WCST). ① WCST test: The edition revised by Nelson was used. We would take the times of sorting, incorrect response, persistent incorrect response, and randomly incorrect response as the index of evaluation. ② Stroop tests: The edition revised by Trenarry was used and this test had two types: form color and form color-word. Their incorrect response and response time were recorded for data analysis in the end.MAIN OUTCOME MEASURES: Results of WCST test and Stroop tests.RESULTS: A

  6. Toward practical definitions of quality for food science

    DEFF Research Database (Denmark)

    Bremner, Allan

    2000-01-01

    the missing link of specific definitions related to measurable attributes and properties determined by standard methods to provide values that can be used to evaluate foods or to set specifications. It is compatible with control, assurance, HACCP, regulatory, TQM, and other normal uses of the both the word......A new practical approach to developing workable definitions of quality is presented to overcome the numerous semantic and conceptual difficulties that an common with the use of the word quality in food science. This approach links the concept of quality, through a general definition, by adding...

  7. Toward practical definitions of quality for food science

    DEFF Research Database (Denmark)

    Bremner, Allan

    2000-01-01

    A new practical approach to developing workable definitions of quality is presented to overcome the numerous semantic and conceptual difficulties that an common with the use of the word quality in food science. This approach links the concept of quality, through a general definition, by adding...... the missing link of specific definitions related to measurable attributes and properties determined by standard methods to provide values that can be used to evaluate foods or to set specifications. It is compatible with control, assurance, HACCP, regulatory, TQM, and other normal uses of the both the word...... quality, and the concept quality, in food science and technology....

  8. Toward practical definitions of quality for food science.

    Science.gov (United States)

    Bremner, H A

    2000-01-01

    A new practical approach to developing workable definitions of quality is presented to overcome the numerous semantic and conceptual difficulties that are common with the use of the word quality in food science. This approach links the concept of quality, through a general definition, by adding the missing link of specific definitions related to measurable attributes and properties determined by standard methods to provide values that can be used to evaluate foods or to set specifications. It is compatible with control, assurance, HACCP, regulatory, TQM, and other normal uses of the both the word quality, and the concept quality, in food science and technology.

  9. Voice congruency facilitates word recognition.

    Directory of Open Access Journals (Sweden)

    Sandra Campeanu

    Full Text Available Behavioral studies of spoken word memory have shown that context congruency facilitates both word and source recognition, though the level at which context exerts its influence remains equivocal. We measured event-related potentials (ERPs while participants performed both types of recognition task with words spoken in four voices. Two voice parameters (i.e., gender and accent varied between speakers, with the possibility that none, one or two of these parameters was congruent between study and test. Results indicated that reinstating the study voice at test facilitated both word and source recognition, compared to similar or no context congruency at test. Behavioral effects were paralleled by two ERP modulations. First, in the word recognition test, the left parietal old/new effect showed a positive deflection reflective of context congruency between study and test words. Namely, the same speaker condition provided the most positive deflection of all correctly identified old words. In the source recognition test, a right frontal positivity was found for the same speaker condition compared to the different speaker conditions, regardless of response success. Taken together, the results of this study suggest that the benefit of context congruency is reflected behaviorally and in ERP modulations traditionally associated with recognition memory.

  10. Mapping Persian Words to WordNet Synsets

    Directory of Open Access Journals (Sweden)

    Mehrnoush Shamsfard

    2009-12-01

    Full Text Available Lexical ontologies are one of the main resourcesfor developing natural language processing and semantic web applications. Mapping lexical ontologies of different languagesis very important for inter-lingual tasks. On the other hand mapping approaches can be implied to build lexical ontologies for a new language based on pre-existing resources of other languages. In this paper we propose a semantic approach for mapping Persian words to Princeton WordNet Synsets. As there is no lexical ontology for Persian, our approach helps not only in building one for this language but also enables semantic web applications on Persian documents. To do the mapping, we calculate the similarity of Persian words and English synsets using their features such as super-classes and subclasses, domain and related words. Our approach is an improvement of an existing one applying in a new domain, which increases the recall noticeably.

  11. BioWord: A sequence manipulation suite for Microsoft Word

    Directory of Open Access Journals (Sweden)

    Anzaldi Laura J

    2012-06-01

    Full Text Available Abstract Background The ability to manipulate, edit and process DNA and protein sequences has rapidly become a necessary skill for practicing biologists across a wide swath of disciplines. In spite of this, most everyday sequence manipulation tools are distributed across several programs and web servers, sometimes requiring installation and typically involving frequent switching between applications. To address this problem, here we have developed BioWord, a macro-enabled self-installing template for Microsoft Word documents that integrates an extensive suite of DNA and protein sequence manipulation tools. Results BioWord is distributed as a single macro-enabled template that self-installs with a single click. After installation, BioWord will open as a tab in the Office ribbon. Biologists can then easily manipulate DNA and protein sequences using a familiar interface and minimize the need to switch between applications. Beyond simple sequence manipulation, BioWord integrates functionality ranging from dyad search and consensus logos to motif discovery and pair-wise alignment. Written in Visual Basic for Applications (VBA as an open source, object-oriented project, BioWord allows users with varying programming experience to expand and customize the program to better meet their own needs. Conclusions BioWord integrates a powerful set of tools for biological sequence manipulation within a handy, user-friendly tab in a widely used word processing software package. The use of a simple scripting language and an object-oriented scheme facilitates customization by users and provides a very accessible educational platform for introducing students to basic bioinformatics algorithms.

  12. How to Memorize English Words

    Institute of Scientific and Technical Information of China (English)

    吴晓丽

    2016-01-01

    Language is a complicated system, which mainly contains phonology, vocabulary, grammar. The vocabulary is just like stocks used to build the house of a language. Lexicon is fundamental material in language learning. The author attempts to explore English word formation form morphemes. The morpheme, can be considered as“the smallest functioning unit in the composition of words”. Morphemes are classified into prefix, root and suffix. In order to have a good command of words, English learners could adopt the rules of word formation from morphemes to enlarge vocabulary efficiently.

  13. Teach yourself visually Word 2013

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    Get up to speed on the newest version of Word with visual instruction Microsoft Word is the standard for word processing programs, and the newest version offers additional functionality you'll want to use. Get up to speed quickly and easily with the step-by-step instructions and full-color screen shots in this popular guide! You'll see how to perform dozens of tasks, including how to set up and format documents and text; work with diagrams, charts, and pictures; use Mail Merge; post documents online; and much more. Easy-to-follow, two-page lessons make learning a snap.Full-

  14. Microsoft Word 2010 Digital Classroom

    CERN Document Server

    Team, Training

    2011-01-01

    The perfect book-and-video training package for Word 2010! This Word 2010 book-and-video training package-from the same professional training experts who also create many training materials for Adobe Systems-is like having your own personal instructor guiding you through each lesson, but you work at your own pace! The full-color ebook includes 8 lessons that teach you the new features and quirks of Microsoft Word 2010. Each lesson includes step-by-step instructions and lesson files, and provides valuable video tutorials that complement what you're learning and clearly demonstr

  15. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  16. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  17. From Word Alignment to Word Senses, via Multilingual Wordnets

    Directory of Open Access Journals (Sweden)

    Dan Tufis

    2006-05-01

    Full Text Available Most of the successful commercial applications in language processing (text and/or speech dispense with any explicit concern on semantics, with the usual motivations stemming from the computational high costs required for dealing with semantics, in case of large volumes of data. With recent advances in corpus linguistics and statistical-based methods in NLP, revealing useful semantic features of linguistic data is becoming cheaper and cheaper and the accuracy of this process is steadily improving. Lately, there seems to be a growing acceptance of the idea that multilingual lexical ontologisms might be the key towards aligning different views on the semantic atomic units to be used in characterizing the general meaning of various and multilingual documents. Depending on the granularity at which semantic distinctions are necessary, the accuracy of the basic semantic processing (such as word sense disambiguation can be very high with relatively low complexity computing. The paper substantiates this statement by presenting a statistical/based system for word alignment and word sense disambiguation in parallel corpora. We describe a word alignment platform which ensures text pre-processing (tokenization, POS-tagging, lemmatization, chunking, sentence and word alignment as required by an accurate word sense disambiguation.

  18. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  19. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  20. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  1. On the anatomy of social engineering attacks -- A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing sin

  2. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  3. Learning word meanings during reading by children with language learning disability and typically-developing peers.

    Science.gov (United States)

    Steele, Sara C; Watkins, Ruth V

    2010-06-01

    This study investigated whether children with language learning disability (LLD) differed from typically-developing peers in their ability to learn meanings of novel words presented during reading. Fifteen 9-11-year-old children with LLD and 15 typically-developing peers read four passages containing 20 nonsense words. Word learning was assessed through oral definition and multiple-choice tasks. Variables were position of informative context, number of exposures, part of speech, and contextual clues. The LLD group scored lower than same-aged peers on oral definition (p < .001) and multiple-choice (p < .001) tasks. For both groups, there was no effect for position of informative context (p = .867) or number of exposures (p = .223). All children benefitted from contextual clues. The findings suggested difficulty inferring and recalling word meanings during reading and pointed to the need for vocabulary intervention in the upper elementary years for children with LLD.

  4. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  5. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  6. A new geometric approach to Sturmian words

    CERN Document Server

    Matomäki, Kaisa

    2012-01-01

    We introduce a new geometric approach to Sturmian words by means of a mapping that associates certain lines in the n x n -grid and sets of finite Sturmian words of length n. Using this mapping, we give new proofs of the formulas enumerating the finite Sturmian words and the palindromic finite Sturmian words of a given length. We also give a new proof for the well-known result that a factor of a Sturmian word has precisely two return words.

  7. Emotional arousal enhances word repetition priming

    OpenAIRE

    Thomas, Laura A.; LaBar, Kevin S.

    2005-01-01

    Three experiments were conducted to determine if emotional content increases repetition priming magnitude. In the study phase of Experiment 1, participants rated high-arousing negative (taboo) words and neutral words for concreteness. In the test phase, they made lexical decision judgements for the studied words intermixed with novel words (half taboo, half neutral) and pseudowords. In Experiment 2, low-arousing negative (LAN) words were substituted for the taboo words, and in Experiment 3 al...

  8. Social interaction facilitates word learning in preverbal infants: Word-object mapping and word segmentation.

    Science.gov (United States)

    Hakuno, Yoko; Omori, Takahide; Yamamoto, Jun-Ichi; Minagawa, Yasuyo

    2017-08-01

    In natural settings, infants learn spoken language with the aid of a caregiver who explicitly provides social signals. Although previous studies have demonstrated that young infants are sensitive to these signals that facilitate language development, the impact of real-life interactions on early word segmentation and word-object mapping remains elusive. We tested whether infants aged 5-6 months and 9-10 months could segment a word from continuous speech and acquire a word-object relation in an ecologically valid setting. In Experiment 1, infants were exposed to a live tutor, while in Experiment 2, another group of infants were exposed to a televised tutor. Results indicate that both younger and older infants were capable of segmenting a word and learning a word-object association only when the stimuli were derived from a live tutor in a natural manner, suggesting that real-life interaction enhances the learning of spoken words in preverbal infants. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Wording effects in moral judgments

    Directory of Open Access Journals (Sweden)

    Ross E. O'Hara

    2010-12-01

    Full Text Available As the study of moral judgments grows, it becomes imperative to compare results across studies in order to create unified theories within the field. These efforts are potentially undermined, however, by variations in wording used by different researchers. The current study sought to determine whether, when, and how variations in wording influence moral judgments. Online participants responded to 15 different moral vignettes (e.g., the trolley problem using 1 of 4 adjectives: ``wrong'', ``inappropriate'', ``forbidden'', or ``blameworthy''. For half of the sample, these adjectives were preceded by the adverb ``morally''. Results indicated that people were more apt to judge an act as wrong or inappropriate than forbidden or blameworthy, and that disgusting acts were rated as more acceptable when ``morally'' was included. Although some wording differences emerged, effects sizes were small and suggest that studies of moral judgment with different wordings can legitimately be compared.

  10. The Inclusion of Word Formation

    African Journals Online (AJOL)

    user

    Die problem van polisemiese inskrywings waaraan onverklaardes geheg word, ..... It seems overly optimistic to expect an average dictionary user to read the Ref- ..... many areas', '(of a vowel) produced with the centre of the tongue in a higher.

  11. Prevention of Attacks under DDoS Using Target Customer Behavior

    Directory of Open Access Journals (Sweden)

    S.Malathi

    2012-09-01

    Full Text Available The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests for the data from the server and the server provides the response for the client-request. Here the client can violate the server performance by sending continuous or anomaly requests. The result is the server performance becomes degraded. This paper discusses how best the degradation of the performance can be prevented using some algorithm proposed in the methodology. In this work the blocking is done using a different mechanism based on the category of the client.

  12. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  13. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  14. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  15. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  16. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  17. 49 CFR 1245.3 - Employees; definition, service hours, and compensation.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Employees; definition, service hours, and... CLASSIFICATION OF RAILROAD EMPLOYEES; REPORTS OF SERVICE AND COMPENSATION § 1245.3 Employees; definition, service hours, and compensation. (a) Definition of “employees”. The word employees, as used in this part,...

  18. How New Words Are Formed

    Institute of Scientific and Technical Information of China (English)

    YU He

    2015-01-01

    With the development of the society and culture, English vocabulary change rapidly. English has always been in a state of evolution. In recent years new words enter the English language at an increasing rate. This paper makes an attempt to analyze eight ways of new English word formation, creating, blending, shortening, functional shift, back-formation, affixation, com⁃pounding and borrowing—by presenting mainly English examples.

  19. The 5000 most frequent words in the official textbooks of mexican basic education

    Directory of Open Access Journals (Sweden)

    Julio Agustín Varela Barraza

    2013-12-01

    Full Text Available Abstract The paper briefly describes the importance of the word's frequency lists used in school textbooks on the regulation of vocabulary. In addition its frequent use in various fields of knowledge is indicated. According with the classical definition of the Royal Spanish Language Academy, our aim is show the 2,000 mostly used words found in the official texts of basic education in Mexico are presented.

  20. Visual recognition of permuted words

    Science.gov (United States)

    Rashid, Sheikh Faisal; Shafait, Faisal; Breuel, Thomas M.

    2010-02-01

    In current study we examine how letter permutation affects in visual recognition of words for two orthographically dissimilar languages, Urdu and German. We present the hypothesis that recognition or reading of permuted and non-permuted words are two distinct mental level processes, and that people use different strategies in handling permuted words as compared to normal words. A comparison between reading behavior of people in these languages is also presented. We present our study in context of dual route theories of reading and it is observed that the dual-route theory is consistent with explanation of our hypothesis of distinction in underlying cognitive behavior for reading permuted and non-permuted words. We conducted three experiments in lexical decision tasks to analyze how reading is degraded or affected by letter permutation. We performed analysis of variance (ANOVA), distribution free rank test, and t-test to determine the significance differences in response time latencies for two classes of data. Results showed that the recognition accuracy for permuted words is decreased 31% in case of Urdu and 11% in case of German language. We also found a considerable difference in reading behavior for cursive and alphabetic languages and it is observed that reading of Urdu is comparatively slower than reading of German due to characteristics of cursive script.

  1. Associative asymmetry of compound words.

    Science.gov (United States)

    Caplan, Jeremy B; Boulton, Kathy L; Gagné, Christina L

    2014-07-01

    Early verbal-memory researchers assumed participants represent memory of a pair of unrelated items with 2 independent, separately modifiable, directional associations. However, memory for pairs of unrelated words (A-B) exhibits associative symmetry: a near-perfect correlation between accuracy on forward (A →?) and backward (?← B) cued recall. This was viewed as arguing against the independent-associations hypothesis and in favor of the hypothesis that associations are remembered as holistic units. Here we test the Holistic Representation hypothesis further by examining cued recall of compound words. If we suppose preexisting words are more unitized than novel associations, the Holistic Representation hypothesis predicts compound words (e.g., ROSE BUD) will have a higher forward-backward correlation than novel compounds (e.g., BRIEF TAX). We report the opposite finding: Compound words, as well as noncompound words, exhibited less associative symmetry than novel compounds. This challenges the Holistic Representation account of associative symmetry. Moreover, preexperimental associates (positional family size) influenced associative symmetry-but asymmetrically: Increasing family size of the last constituent increasing decoupled forward and backward recall, but family size of the 1st constituent had no such effect. In short, highly practiced, meaningful associations exhibit associative asymmetry, suggesting associative symmetry is not diagnostic of holistic representations but, rather, is a characteristic of ad hoc associations. With additional learning, symmetric associations may be replaced by directional, independently modifiable associations as verbal associations become embedded within a rich knowledge structure.

  2. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  3. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  4. Attacks and infections in percolation processes

    Science.gov (United States)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-08-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data.

  5. Acquiring concepts and features of novel words by two types of learning: direct mapping and inference.

    Science.gov (United States)

    Chen, Shuang; Wang, Lin; Yang, Yufang

    2014-04-01

    This study examined the semantic representation of novel words learnt in two conditions: directly mapping a novel word to a concept (Direct mapping: DM) and inferring the concept from provided features (Inferred learning: IF). A condition where no definite concept could be inferred (No basic-level meaning: NM) served as a baseline. The semantic representation of the novel word was assessed via a semantic-relatedness judgment task. In this task, the learned novel word served as a prime, while the corresponding concept, an unlearned feature of the concept, and an unrelated word served as targets. ERP responses to the targets, primed by the novel words in the three learning conditions, were compared. For the corresponding concept, smaller N400s were elicited in the DM and IF conditions than in the NM condition, indicating that the concept could be obtained in both learning conditions. However, for the unlearned feature, the targets in the IF condition produced an N400 effect while in the DM condition elicited an LPC effect relative to the NM learning condition. No ERP difference was observed among the three learning conditions for the unrelated words. The results indicate that conditions of learning affect the semantic representation of novel word, and that the unlearned feature was only activated by the novel word in the IF learning condition.

  6. Mark my words: tone of voice changes affective word representations in memory.

    Science.gov (United States)

    Schirmer, Annett

    2010-02-15

    The present study explored the effect of speaker prosody on the representation of words in memory. To this end, participants were presented with a series of words and asked to remember the words for a subsequent recognition test. During study, words were presented auditorily with an emotional or neutral prosody, whereas during test, words were presented visually. Recognition performance was comparable for words studied with emotional and neutral prosody. However, subsequent valence ratings indicated that study prosody changed the affective representation of words in memory. Compared to words with neutral prosody, words with sad prosody were later rated as more negative and words with happy prosody were later rated as more positive. Interestingly, the participants' ability to remember study prosody failed to predict this effect, suggesting that changes in word valence were implicit and associated with initial word processing rather than word retrieval. Taken together these results identify a mechanism by which speakers can have sustained effects on listener attitudes towards word referents.

  7. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  10. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  11. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  12. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  13. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  14. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  15. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  16. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  17. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant...have campus police departments located on the university grounds, a preferred option would be to utilize the police department’s secured facility to

  18. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  19. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  20. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  1. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  2. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  3. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  4. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    Science.gov (United States)

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  6. The Pursuit of Word Meanings.

    Science.gov (United States)

    Stevens, Jon Scott; Gleitman, Lila R; Trueswell, John C; Yang, Charles

    2017-04-01

    We evaluate here the performance of four models of cross-situational word learning: two global models, which extract and retain multiple referential alternatives from each word occurrence; and two local models, which extract just a single referent from each occurrence. One of these local models, dubbed Pursuit, uses an associative learning mechanism to estimate word-referent probability but pursues and tests the best referent-meaning at any given time. Pursuit is found to perform as well as global models under many conditions extracted from naturalistic corpora of parent-child interactions, even though the model maintains far less information than global models. Moreover, Pursuit is found to best capture human experimental findings from several relevant cross-situational word-learning experiments, including those of Yu and Smith (), the paradigm example of a finding believed to support fully global cross-situational models. Implications and limitations of these results are discussed, most notably that the model characterizes only the earliest stages of word learning, when reliance on the co-occurring referent world is at its greatest. Copyright © 2016 Cognitive Science Society, Inc.

  7. A SPECIAL SKELETONIZATION ALGORITHM FOR CURSIVE WORDS

    NARCIS (Netherlands)

    Steinherz, T.; Intrator, N.; Rivlin, E.

    2004-01-01

    We present a novel approach for finding a pseudo­skeleton of a cursive word\\\\'s image. This pseudo­skeleton preserves all the necessary components of a cursive word such as: loops, curves, junctions, end­points etc. It is expected to be useful for cursive word recognition

  8. Multiple Uses of a Word Study Technique

    Science.gov (United States)

    Joseph, Laurice M.; Orlins, Andrew

    2005-01-01

    This paper presents two case studies that illustrate the multiple uses of word sorts, a word study phonics technique. Case study children were Sara, a second grader, who had difficulty with reading basic words and John, a third grader, who had difficulty with spelling basic words. Multiple baseline designs were employed to study the effects of…

  9. Processing of Color Words Activates Color Representations

    Science.gov (United States)

    Richter, Tobias; Zwaan, Rolf A.

    2009-01-01

    Two experiments were conducted to investigate whether color representations are routinely activated when color words are processed. Congruency effects of colors and color words were observed in both directions. Lexical decisions on color words were faster when preceding colors matched the color named by the word. Color-discrimination responses…

  10. Emotion Words Affect Eye Fixations during Reading

    Science.gov (United States)

    Scott, Graham G.; O'Donnell, Patrick J.; Sereno, Sara C.

    2012-01-01

    Emotion words are generally characterized as possessing high arousal and extreme valence and have typically been investigated in paradigms in which they are presented and measured as single words. This study examined whether a word's emotional qualities influenced the time spent viewing that word in the context of normal reading. Eye movements…

  11. Word Learning Deficits in Children with Dyslexia

    Science.gov (United States)

    Alt, Mary; Hogan, Tiffany; Green, Samuel; Gray, Shelley; Cabbage, Kathryn; Cowan, Nelson

    2017-01-01

    Purpose: The purpose of this study is to investigate word learning in children with dyslexia to ascertain their strengths and weaknesses during the configuration stage of word learning. Method: Children with typical development (N = 116) and dyslexia (N = 68) participated in computer-based word learning games that assessed word learning in 4 sets…

  12. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  13. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  14. Sparing of number words in oral production

    Directory of Open Access Journals (Sweden)

    Carlo Semenza

    2014-04-01

    In sentences only number words were spared; free standing function words and bound morphemes were as affected as other word categories. Discussion. These findings seem to set cardinal number words apart in the phonological output buffer from other possible building blocks of preassembled phonological units (like function words and bound morphemes. Building blocks constituted by numbers are more cohesive than the blocks constituted by function words and bound morphemes. Bencini et al. (2011 argued that numbers are recursive and consist of basic lexical units which are then combined following syntactic rules. This property would make number words resistant to damage in the phonological buffer.

  15. Identifying Trends in Word Frequency Dynamics

    Science.gov (United States)

    Altmann, Eduardo G.; Whichard, Zakary L.; Motter, Adilson E.

    2013-04-01

    The word-stock of a language is a complex dynamical system in which words can be created, evolve, and become extinct. Even more dynamic are the short-term fluctuations in word usage by individuals in a population. Building on the recent demonstration that word niche is a strong determinant of future rise or fall in word frequency, here we introduce a model that allows us to distinguish persistent from temporary increases in frequency. Our model is illustrated using a 108-word database from an online discussion group and a 1011-word collection of digitized books. The model reveals a strong relation between changes in word dissemination and changes in frequency. Aside from their implications for short-term word frequency dynamics, these observations are potentially important for language evolution as new words must survive in the short term in order to survive in the long term.

  16. Fast mapping of words and story recall by individuals with Down syndrome.

    Science.gov (United States)

    Bird, Elizabeth Kay-Raining; Chapman, Robin S; Schwartz, Scott E

    2004-12-01

    This study compared adolescents with Down syndrome to nonverbal mental-age matched controls in their ability to fast map new noun vocabulary in spoken story contexts. Context for novel words varied within subjects in the distance between mentions (close-distant) and the ease of inferring a real word for the referent (specificity). The 23 participants with Down syndrome (DS) were aged 12.8-20.3 years. The 24 typically developing (TD) children, matched on visual nonverbal mental age (MA), were 4.1 to 6.1 years old. Participants listened to 4 tape-recorded stories, each containing 3 mentions of 2 novel words in close or distant proximity and with clear or uncertain reference, and recalled each story after presentation. Fast-mapping production was measured by the occurrence of the novel word in story recall. Fast-mapping comprehension was measured by asking children to define the novel words. The DS group did not differ from the TD group in novel word production but seemed to have more difficulty with novel word definition. For both groups, novel word production was higher in the nonspecific than the specific referent condition, suggesting that availability of a real word label interfered with fast mapping. Recall of story propositions was poorer for the DS group. For both groups, story recall was better for text units not directly associated with novel words than for text units containing novel words, suggesting a trade-off effect in processing. Regression analyses indicated that syntax comprehension, rather than mean length of utterance, predicted novel word production in both groups; MA additionally contributed to predict DS story recall.

  17. Word learning under infinite uncertainty

    CERN Document Server

    Blythe, Richard A; Smith, Kenny

    2014-01-01

    Language learners learn the meanings of many thousands of words, despite encountering them in complex environments where infinitely many meanings might be inferred by the learner as their true meaning. This problem of infinite referential uncertainty is often attributed to Willard Van Orman Quine. We provide a mathematical formalisation of an ideal cross-situational learner attempting to learn under infinite referential uncertainty, and identify conditions under which this can happen. As Quine's intuitions suggest, learning under infinite uncertainty is possible, provided that learners have some means of ranking candidate word meanings in terms of their plausibility; furthermore, our analysis shows that this ranking could in fact be exceedingly weak, implying that constraints allowing learners to infer the plausibility of candidate word meanings could also be weak.

  18. Math word problems for dummies

    CERN Document Server

    Sterling, Mary Jane

    2008-01-01

    Covers percentages, probability, proportions, and moreGet a grip on all types of word problems by applying them to real lifeAre you mystified by math word problems? This easy-to-understand guide shows you how to conquer these tricky questions with a step-by-step plan for finding the right solution each and every time, no matter the kind or level of problem. From learning math lingo and performing operations to calculating formulas and writing equations, you''ll get all the skills you need to succeed!Discover how to: * Translate word problems into plain English* Brush up on basic math skills* Plug in the right operation or formula* Tackle algebraic and geometric problems* Check your answers to see if they work

  19. Factored Translation with Unsupervised Word Clusters

    DEFF Research Database (Denmark)

    Rishøj, Christian; Søgaard, Anders

    2011-01-01

    Unsupervised word clustering algorithms — which form word clusters based on a measure of distributional similarity — have proven to be useful in providing beneficial features for various natural language processing tasks involving supervised learning. This work explores the utility of such word c....... While such an “oracle” method is not identified, evaluations indicate that unsupervised word cluster are most beneficial in sentences without unknown words....

  20. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Cezar Vasilescu

    2012-06-01

    Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.