WorldWideScience

Sample records for deliberate night attack

  1. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  2. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  3. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  4. Association of ambient air pollution and meteorological factors with primary care visits at night due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2013-09-01

    The association of outdoor air pollution and meteorological elements with primary care visits at night due to asthma attack was studied. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. The subjects were 956 children aged 0-14 years who visited the clinic with an asthma attack between the hours of 9 p.m. and 6 a.m. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and a number of meteorological elements were measured, and a conditional logistic regression model was used to estimate odds ratios (ORs) of primary care visits per unit increment of air pollutants or meteorological elements. The analyses took into consideration the effects of seasonality. Of the 956 children, 73 (7.6 %) were aged asthma attack at night in the spring or summer was found. An inverse relation between suspended particulate matter and primary care visits due to asthma attack was detected in the winter. ORs in the summer per degree increment in daily mean temperature was 1.31 [95 % confidential interval (CI) 1.09-1.56], and ORs in the autumn per hourly increment in daily hours of sunshine was 0.94 (95 % CI 0.90-0.99). The findings of our study fail to support any association between daily mean concentration of air pollutant and primary care visits at night. However, we did find evidence indicating that certain meteorological elements may be associated with primary care visits.

  5. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  6. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  9. White Nights rebuts Pravda claims

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that another Russo-foreign joint venture under attack in the Moscow press has denied charges of impropriety and mismanagement in its operations. The White Nights joint venture last month came under scathing attack from Moscow newspaper Pravda, which alleged the venture has reneged on its promises, is virtually bankrupt, and mistreats Russian employees. White Nights is a joint venture owned 50% by Varyeganneftegaz (VNG), a Russian oil and gas enterprise, and 50% by Salomon Inc. unit Phibro Energy Inc., Greenwich, Conn., and Anglo-Suisse (U.S.S.R.) Ltd., a subsidiary of Anglo-Suisse Inc., Houston. The venture started operations Apr. 1, 1991, with a program of workovers, redevelopment, and horizontal wells in West Varyegan and Tagrinsk oil fields in western Siberia

  10. Sleeping position and reported night-time asthma symptoms and ...

    African Journals Online (AJOL)

    A 49 years old man, known case of bronchial asthma for 43 years, with history of frequent asthmatic attacks, usually responding to double dose of intravenous Aminophylline and double dose of Hydrocortisone was received at medical emergency care unit at midnight with night-time asthma attack. The attack did not settle ...

  11. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  12. Sleeping position and reported night-time asthma symptoms and medication.

    Science.gov (United States)

    Kalolella, Admirabilis Beno

    2016-01-01

    A 49 years old man, known case of bronchial asthma for 43 years, with history of frequent asthmatic attacks, usually responding to double dose of intravenous Aminophylline and double dose of Hydrocortisone was received at medical emergency care unit at midnight with night-time asthma attack. The attack did not settle with Aminophylline single Intravenous injection. He was then admitted and put in supine sleep position for re-evaluation while his asthma symptoms were monitored while waiting for the medical officer's evaluation of his asthma status. After 3 hours of observation, asthma symptoms were relieved, and patient was discharged home and advised to sleep in supine position throughout every night to prevent asthma symptoms. The patient was followed up through nighttime sleep diary for one month. After one month period of monitoring, the patient had significance reduction in asthma symptoms and reduced night time medication, reduced episodes of night awakening due to asthma symptoms, and improved capability for normal works. This case report describes a novel approach of management and prophylaxis of asthmatic episodes through sleeping position that reduces and control asthma symptoms resulting in reduced drug consumption.

  13. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  14. Airborne Use of Night Vision Systems

    Science.gov (United States)

    Mepham, S.

    1990-04-01

    Mission Management Department of the Royal Aerospace Establishment has won a Queen's Award for Technology, jointly with GEC Sensors, in recognition of innovation and success in the development and application of night vision technology for fixed wing aircraft. This work has been carried out to satisfy the operational needs of the Royal Air Force. These are seen to be: - Operations in the NATO Central Region - To have a night as well as a day capability - To carry out low level, high speed penetration - To attack battlefield targets, especially groups of tanks - To meet these objectives at minimum cost The most effective way to penetrate enemy defences is at low level and survivability would be greatly enhanced with a first pass attack. It is therefore most important that not only must the pilot be able to fly at low level to the target but also he must be able to detect it in sufficient time to complete a successful attack. An analysis of the average operating conditions in Central Europe during winter clearly shows that high speed low level attacks can only be made for about 20 per cent of the 24 hours. Extending this into good night conditions raises the figure to 60 per cent. Whilst it is true that this is for winter conditions and in summer the situation is better, the overall advantage to be gained is clear. If our aircraft do not have this capability the potential for the enemy to advance his troops and armour without hinderance for considerable periods is all too obvious. There are several solutions to providing such a capability. The one chosen for Tornado GR1 is to use Terrain Following Radar (TFR). This system is a complete 24 hour capability. However it has two main disadvantages, it is an active system which means it can be jammed or homed into, and is useful in attacking pre-planned targets. Second it is an expensive system which precludes fitting to other than a small number of aircraft.

  15. On the security of Y-00 under fast correlation and other attacks on the key

    Science.gov (United States)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  16. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  17. Voluntarism and transparent deliberation

    DEFF Research Database (Denmark)

    Steglich-Petersen, Asbjørn

    2006-01-01

    It is widely assumed that doxastic deliberation is transparent to the factual question of the truth of the proposition being considered for belief, and that this sets doxastic deliberation apart from practical deliberation. This feature is frequently invoked in arguments against doxastic voluntar......It is widely assumed that doxastic deliberation is transparent to the factual question of the truth of the proposition being considered for belief, and that this sets doxastic deliberation apart from practical deliberation. This feature is frequently invoked in arguments against doxastic...

  18. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  19. Prasinovirus Attack of Ostreococcus Is Furtive by Day but Savage by Night.

    Science.gov (United States)

    Derelle, Evelyne; Yau, Sheree; Moreau, Hervé; Grimsley, Nigel H

    2018-02-15

    Prasinoviruses are large DNA viruses that infect diverse genera of green microalgae worldwide in aquatic ecosystems, but molecular knowledge of their life cycles is lacking. Several complete genomes of both these viruses and their marine algal hosts are now available and have been used to show the pervasive presence of these species in microbial metagenomes. We have analyzed the life cycle of Ostreococcus tauri virus 5 (OtV5), a lytic virus, using transcriptome sequencing (RNA-Seq) from 12 time points of healthy or infected Ostreococcus tauri cells over a day/night cycle in culture. In the day, viral gene transcription remained low while host nitrogen metabolism gene transcription was initially strongly repressed for two successive time points before being induced for 8 h, but during the night, viral transcription increased steeply while host nitrogen metabolism genes were repressed and many host functions that are normally reduced in the dark appeared to be compensated either by genes expressed from the virus or by increased expression of a subset of 4.4% of the host's genes. Some host cells underwent lysis progressively during the night, but a larger proportion were lysed the following morning. Our data suggest that the life cycles of algal viruses mirror the diurnal rhythms of their hosts. IMPORTANCE Prasinoviruses are common in marine environments, and although several complete genomes of these viruses and their hosts have been characterized, little is known about their life cycles. Here we analyze in detail the transcriptional changes occurring over a 27-h-long experiment in a natural diurnal rhythm, in which the growth of host cells is to some extent synchronized, so that host DNA replication occurs late in the day or early in the night and cell division occurs during the night. Surprisingly, viral transcription remains quiescent over the daytime, when the most energy (from light) is available, but during the night viral transcription activates, accompanied

  20. Deliberate Self Harm Behavior

    Directory of Open Access Journals (Sweden)

    Fatma Gul Helvaci Celik

    2017-06-01

    Full Text Available The deliberate self-harm behaviour which defined as attempting to own body resulting in tisue damage without conscious desire of peolple to die, is a major public health problem worldwide. The causes of deliberate self- harm, risk factors, the relationship between mental disorders and treatment strategies are not fully known. Deliberate self- harm can be observed together with psychiatric disorders such as borderline personality disorder, histrionic personality disorder, eating disorders and mood disorders. Also, deliberate self-harm must be distinguished from suicidal behavior. Psychologi-cal trauma has been suggested as a risk factor for deliberate self- harm behavior. Trauma and traumatic events have long been associated with deliberate self- harm behavior. The aim of this review article is to investigate the etiology and epidemiology of deliberate self-harm behaviour and relationship between psychiatric disorders. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2017; 9(2.000: 209-226

  1. Homicides with direct and indirect links to the night-time economy.

    Science.gov (United States)

    Tomsen, Stephen

    2018-06-11

    Alcohol use and homicide are a wide community concern with particular interest in understanding and preventing attacks (e.g. 'one punch' male on male attacks) in commercial nightlife settings with high levels of collective drinking. There is insufficient knowledge of the long-term patterns in this violence or the relationship between public drinking and flow on violence in other social settings. Alcohol-related homicides were those in which alcohol consumption was a contributing factor. Those also linked to purchase or consumption in locations where alcohol is sold after dark were classified as night-time economy related. The study comprised a first-hand analysis of files in the archive of the Australian National Homicide Monitoring Program in 2 years with a decade gap (1998/1999-2007/2008), and it classified 73 of all 238 alcohol-related incidents by direct or indirect relation to public nightlife settings. Related homicides in these years were not highly concentrated in developed night-time economies, but more spread outside major nightlife zones. Indirectly related killings were even more dispersed and included more women victims killed in domestic settings. There is a consistent though dispersed relationship between heavy public drinking at night and homicide. Concerns about homicide and night-time drinking leisure with mostly male victims attacked in well-known areas of busy city nightlife, must also consider the broader gendered patterns of 'flow on' nightlife-related incidents, including fatal semi-private and domestic violence that is indirectly but importantly related to drinking and alcohol purchase in public commercial nightlife. © 2018 Australasian Professional Society on Alcohol and other Drugs.

  2. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  3. Diet quality and sleep quality among day and night shift nurses.

    Science.gov (United States)

    Beebe, Deborah; Chang, Jen Jen; Kress, Kathleen; Mattfeldt-Beman, Mildred

    2017-10-01

    To determine whether night shift workers have a poorer diet quality and sleep quality when compared with day shift nurses. There is a dearth of research investigating the association between diet quality and sleep quality of day and night shift nurses. Data on nurses (n = 103) working either a day or night shift from two Midwestern hospitals were obtained from August 2015 to February 2016. The instruments used were the Diet History Questionnaire and the Pittsburg Sleep Quality Index. Independent samples t-tests were used to examine differences in diet and sleep quality by work shift schedule. There were no statistically significant differences between nurses working day or night shift and sleep quality (P = 0.0684), as well as diet quality (P = 0.6499). There was a significant difference between both body mass index (P = 0.0014) and exercise (P = 0.0020) with regard to diet quality. Body mass index and sleep quality were also significantly associated (P = 0.0032). Our study found no differences between day and night shift with regard to sleep and diet quality among nurses. Deliberate health initiatives and wellness programmes specifically targeting nurses are needed to increase knowledge about maintaining a healthy lifestyle while working as a nurse, whether it is day or night shift. © 2017 John Wiley & Sons Ltd.

  4. Seeking Deliberation on the Unborn in International Law

    Directory of Open Access Journals (Sweden)

    SA de Freitas

    2011-08-01

    Full Text Available International human rights instruments and jurisprudence radiate an understanding of international law as also serving to protect fundamental rights and the interests of the individual. The idea that human rights provide a credible framework for constructing common norms among nations and across cultures is both powerful and attractive. If the protection of being human serves as the common denominator in human rights discussion, and if human rights are deeply inclusive, despite being culturally and historically diverse, then a failure to deliberate on the legal status and protection of the unborn may be seen as a failure to extend respect where it is due. Such deliberation is required, irrespective of the fact that jurisprudential debate on the unborn and on abortion is complex and controversial. The protection of human life, well-being, and dignity are essential aims of the United Nations Charter and the international system created to implement it. Although there have been collective efforts resulting in substantial development in international human rights law, the international community has not approached the legal status and protection of the unborn as a matter of urgency – this, while much has been accomplished regarding women, children, animals and cloning. This article therefore argues for the development of a deliberative framework so as to further the recognition (not necessarily in an absolute sense of the unborn in international law, bearing in mind that opposition to abortion does not of itself constitute an attack on a woman's right to respect for privacy in her life. The article also sets out what such deliberation on the legal status and protection of the unborn entails, against the background of a procedurally-rational approach.

  5. Exposure to air pollution and meteorological factors associated with children's primary care visits at night due to asthma attack: case-crossover design for 3-year pooled patients.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2015-05-03

    We examined the association of outdoor air pollution and meteorological parameters with primary care visits (PCVs) at night due to asthma attack. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. Participants were 1447 children aged 0-14 years who visited the clinic with an asthma attack from April 2010 until March 2013. Daily concentrations of air pollutants and meteorological parameters were measured. PCVs at night due to asthma attack. A conditional logistic regression model was used to estimate ORs of PCVs per unit increment of air pollutants or meteorological parameters (the per-unit increments of particulate matter with an aerodynamic diameter ≤2.5 µm (PM₂.₅) and ozone were 10 μg/m(3) and 10 ppb, respectively). Analyses took into consideration the effects of seasonality. We noted an association between PCVs and daily ozone levels on the day before a PCV (OR=1.17; 95% CI 1.01 to 1.35; p=0.04), as well as between PCVs and 3-day mean ozone levels before a PCV (OR=1.29; 95% CI 1.00 to 1.46; p=0.04), from April until June. We also observed an association between PCVs and daily PM₂.₅ levels on the day before a PCV from December until March (OR=1.16; 95% CI 1.01 to 1.33; p=0.05). Meteorological parameters, such as hours of sunshine from September until November, atmospheric pressure from April until June, and temperature from April until August, were also found to be associated with PCVs. The findings in the present study supported an association between ozone and PCVs and suggest that certain meteorological items may be associated with PCVs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Network Design for Reliability and Resilience to Attack

    Science.gov (United States)

    2014-03-01

    Program MNE Montenegro PPS-m-n Path-Portfolio-Selection problem where the defender can select a set of m paths and the attacker can destroy n arcs in...where power plants are represented by nodes. Such a node could fail, causing a chain reaction and blackout. An example for a network with arc...deliberate and un- intentional failures. An unintentional failure is a random failure that just happens, e.g., a power plant goes down because of age. A

  7. Night-Time Light Dynamics during the Iraqi Civil War

    Directory of Open Access Journals (Sweden)

    Xi Li

    2018-06-01

    Full Text Available In this study, we analyzed the night-time light dynamics in Iraq over the period 2012–2017 by using Visible Infrared Imaging Radiometer Suite (VIIRS monthly composites. The data quality of VIIRS images was improved by repairing the missing data, and the Night-time Light Ratio Indices (NLRIs, derived from urban extent map and night-time light images, were calculated for different provinces and cities. We found that when the Islamic State of Iraq and Syria (ISIS attacked or occupied a region, the region lost its light rapidly, with the provinces of Al-Anbar, At-Ta’min, Ninawa, and Sala Ad-din losing 63%, 73%, 88%, and 56%, of their night-time light, respectively, between December 2013 and December 2014. Moreover, the light returned after the Iraqi Security Forces (ISF recaptured the region. In addition, we also found that the night-time light in the Kurdish Autonomous Region showed a steady decline after 2014, with the Arbil, Dihok, and As-Sulaymaniyah provinces losing 47%, 18%, and 31% of their night-time light between December 2013 and December 2016 as a result of the economic crisis in the region. The night-time light in Southern Iraq, the region controlled by Iraqi central government, has grown continuously; for example, the night-time light in Al Basrah increased by 75% between December 2013 and December 2017. Regions formerly controlled by ISIS experienced a return of night-time light during 2017 as the ISF retook almost all this territory in 2017. This indicates that as reconstruction began, electricity was re-supplied in these regions. Our analysis shows the night-time light in Iraq is directly linked to the socioeconomic dynamics of Iraq, and demonstrates that the VIIRS monthly night-time light images are an effective data source for tracking humanitarian disasters in that country.

  8. Aims and harvest of moral case deliberation.

    Science.gov (United States)

    Weidema, Froukje C; Molewijk, Bert A C; Kamsteeg, Frans; Widdershoven, Guy A M

    2013-09-01

    Deliberative ways of dealing with ethical issues in health care are expanding. Moral case deliberation is an example, providing group-wise, structured reflection on dilemmas from practice. Although moral case deliberation is well described in literature, aims and results of moral case deliberation sessions are unknown. This research shows (a) why managers introduce moral case deliberation and (b) what moral case deliberation participants experience as moral case deliberation results. A responsive evaluation was conducted, explicating moral case deliberation experiences by analysing aims (N = 78) and harvest (N = 255). A naturalistic data collection included interviews with managers and evaluation questionnaires of moral case deliberation participants (nurses). From the analysis, moral case deliberation appeals for cooperation, team bonding, critical attitude towards routines and nurses' empowerment. Differences are that managers aim to foster identity of the nursing profession, whereas nurses emphasize learning processes and understanding perspectives. We conclude that moral case deliberation influences team cooperation that cannot be controlled with traditional management tools, but requires time and dialogue. Exchanging aims and harvest between manager and team could result in co-creating (moral) practice in which improvements for daily cooperation result from bringing together perspectives of managers and team members.

  9. Voluntarism and transparent deliberation

    DEFF Research Database (Denmark)

    Steglich-Petersen, Asbjørn

    2006-01-01

    voluntarism. I argue that transparency to factual questions occurs in practical deliberation in ways parallel to transparency in doxastic deliberation. I argue that this should make us reconsider the appeal to transparency in arguments against doxastic voluntarism, and the wider issue of distinguishing...... theoretical from practical rationality....

  10. The Effect Specialization and Diversification Involvement on Learning of Sports Skills According To Deliberate Practice and Deliberate Play

    Directory of Open Access Journals (Sweden)

    Mahdi Fahimi

    2016-12-01

    Full Text Available Objective: The aim was effect deliberate practice and deliberate play on sports skills with emphasis on specialization and diversification in boys 10-12. Methods: The 120 male students randomly divided into four groups of volleyball, soccer, basketball deliberate practice and deliberate play. Pretest and posttest were AAHPERD volleyball, soccer, and Basketball sports skills. Duration of the project was 16 weeks and 3 sessions per week and 90 minutes each session began. Data obtained from questionnaires and personal details about sports experience and test were adjusted using parametric tests, such as T-dependent test and MANOVA with Tukey post hoc test, and software Statistical SPSS19. Results: The results of the study showed that compared four groups, deliberate plays to other deliberate practices have a better motor skill in volleyball, soccer and Basketball sports skills (P<0.05. Volleyball and soccer deliberate practice group had developed Soccer Dribble Test and Control dribble and Defensive movement basketball skills test. Basketball deliberate practice group had not developed the others soccer and volleyball skills. Conclusion: The results showed that diversification participation in some exercises during the early stages of growth, can facilitate the development of general cognitive and physiological skills and create a rich environment for children.

  11. Deliberation as Communication Instruction: A Study of a Climate Change Deliberation in an Introductory Biology Course

    Science.gov (United States)

    Drury, Sara A. Mehltretter

    2015-01-01

    The author argues that deliberation is an innovative method for teaching communication skills, particularly group communication, in the undergraduate science, technology, engineering, and math (STEM) curriculum. A case study using a deliberation activity on global climate change in an introductory biology course demonstrates how deliberative…

  12. Deliberate honesty

    NARCIS (Netherlands)

    Bereby-Meyer, Y.; Shalvi, S.

    2015-01-01

    Studies on lying, especially on inhibiting honest responses and generating dishonest responses, suggest that honesty is the default behavior and dishonesty requires deliberate effort. Here, we argue that when lying serves self-interest, that is, when lying is tempting and lies are easy to craft,

  13. Intuition, deliberation, and the evolution of cooperation.

    Science.gov (United States)

    Bear, Adam; Rand, David G

    2016-01-26

    Humans often cooperate with strangers, despite the costs involved. A long tradition of theoretical modeling has sought ultimate evolutionary explanations for this seemingly altruistic behavior. More recently, an entirely separate body of experimental work has begun to investigate cooperation's proximate cognitive underpinnings using a dual-process framework: Is deliberative self-control necessary to reign in selfish impulses, or does self-interested deliberation restrain an intuitive desire to cooperate? Integrating these ultimate and proximate approaches, we introduce dual-process cognition into a formal game-theoretic model of the evolution of cooperation. Agents play prisoner's dilemma games, some of which are one-shot and others of which involve reciprocity. They can either respond by using a generalized intuition, which is not sensitive to whether the game is one-shot or reciprocal, or pay a (stochastically varying) cost to deliberate and tailor their strategy to the type of game they are facing. We find that, depending on the level of reciprocity and assortment, selection favors one of two strategies: intuitive defectors who never deliberate, or dual-process agents who intuitively cooperate but sometimes use deliberation to defect in one-shot games. Critically, selection never favors agents who use deliberation to override selfish impulses: Deliberation only serves to undermine cooperation with strangers. Thus, by introducing a formal theoretical framework for exploring cooperation through a dual-process lens, we provide a clear answer regarding the role of deliberation in cooperation based on evolutionary modeling, help to organize a growing body of sometimes-conflicting empirical results, and shed light on the nature of human cognition and social decision making.

  14. Influence of climate factors on emergency visits for childhood asthma attack.

    Science.gov (United States)

    Hashimoto, Mitsuo; Fukuda, Taiki; Shimizu, Tetsuya; Watanabe, Shou; Watanuki, Satoshi; Eto, Yoshikatsu; Urashima, Mitsuyoshi

    2004-02-01

    Asthma attack shows strong seasonality. The purpose of the present study was to quantify the contribution of climate variables and other seasonal factors on the incidence of emergency visits for childhood asthma in Tokyo, Japan. The number of children who visited emergency rooms at Jikei university hospitals in Tokyo during 1998-2002 (5559 visits) was retrieved retrospectively from files from the Department of Pediatrics, and compared with 45 climate parameters from the Meteorological Agency using multiple regression models with a stepwise backward elimination approach. The number of visits (3.7 +/- 3.1) per night increased significantly when climate conditions showed a rapid decrease from higher barometric pressure, from higher air temperature and from higher humidity, as well as lower wind speed. The best-fit model demonstrated that a 22% variation in the number of visits was explained by a linear relationship with 12 climate variables, which increased to 36% after adjusting for calendar month and day of the week. Moreover, when the number of asthma visits was cut off at nine per night, the area under the receiver operator characteristics curve was 0.91 (95% CI: 0.89-0.94) in the multiple logistic regression model using the same variables. These results suggest that these models might quantify contributions of specific climate conditions and other seasonal factors on the number of emergency visits per night for childhood asthma attack in Tokyo, Japan.

  15. [THE FORMS OF DELIBERATION INVOLVED IN THE FIELD OF BIOETHICS: TECHNIQUE DELIBERATION AND ETHICS DELIBERATION].

    Science.gov (United States)

    Neves Pinto, Gerson

    2015-12-01

    In this article the author examines the formulation of the problem of new technologies with their ethical limits and legal. To do this, in a first it is d'assess the contribuitions of the two most important contemporary philosophers who have treated this subject: Jürgen Habermas and Ronald Dworkin, while trying to put them into dialog with the one who has been one of the founders of l'classic ethics: Aristotle. Then, it tries to answer the question of how could we understand this notion that Dworkin nome "moral dislocation" between the random and the choice or well, as the appointed Habermas, "l'extension of the contingency". Finally, we questioned how the Aristotelian distinction between the technical deliberation and deliberative ethical-moral can contribute to a better understanding of the questions on the decisions and choices that will make the moral agents (such as patients or the judges), as well as those relating to the type of deliberation technique chosen by the doctor or by the health professional.

  16. Designing Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2010-01-01

    the potential to revitalize and transform citizen engagement in democracy.  Although the majority of web 2.0 systems enable these discourses to some extent, government institutions commission and manage specialized deliberation systems (information systems designed to support participative discourse) intended...... to promote citizen engagement.  The most common examples of these are political discussion forums.  Though usually considered trivial adaptations of well-known technologies, these types of deliberative systems are often unsuccessful, and present a distinct set of design and management challenges.......  In this article we analyze the issues involved in establishing political deliberation systems under four headings: stakeholder engagement, web platform design, service management, political process re-shaping and evaluation and improvement.  We review the existing literature and present a longitudinal case study...

  17. Choking at Night: A Case of Opercular Nocturnal Frontal Lobe Epilepsy

    Directory of Open Access Journals (Sweden)

    Geetanjali Rathore

    2013-01-01

    Full Text Available Frontal lobe seizures have a tendency to occur in sleep and in most cases occur exclusively insleep; these individuals are said to have nocturnal frontal lobe (NFLE. NFLE can be difficult to distinguish clinically from various other sleep disorders, particularly parasomnias, which also present with paroxysmal motor activity in sleep. Interictal and ictal EEG findings are frequently unremarkable or nonspecific in both parasomnias and NFLE making the diagnosis even more difficult. Nocturnal epilepsy should be suspected in patients with paroxysmal events at night characterized by high frequency, repetition, extrapyramidal features, and marked stereotypy of attacks. Here we present a 13-year-old female who was extensively worked up for choking episodes at night. On repeat video EEG she was found to have frontal opercular seizures. Once on Carbamazepine, her seizures completely resolved.

  18. The Long Night of Research, Vienna International Centre (VIC), Vienna, Austria, 22 April 2016

    International Nuclear Information System (INIS)

    Jandrić, Zora; Abrahim, Aiman; Kelly, Simon; Cannavan, Andrew

    2016-01-01

    On 22 April the IAEA, along with other VIC-based organizations, took part in the biannual Long Night of Research (Lange Nacht der Forschung); an Austria-wide event coordinated by several Austrian government ministries that aims to spark interest in science and research. This was the seventh year of the Long Night of Research, and the first time the IAEA was involved. The VIC was one of around 250 exhibit locations across the country. The event gave visitors a chance to learn about the variety of nuclear applications in various fields. The Food and Environmental Protection Laboratory (FEPL) exhibition booth focused on testing for food authenticity, posing the question ‘is your food what you think it is?’. Food is an essential part of our daily lives. We need our food to be safe and we want to know what we are eating. Nuclear and related techniques can be used to control food safety and to fight food fraud – the deliberate mislabelling of food products

  19. Procedures and Methods for Cross-community Online Deliberation

    Directory of Open Access Journals (Sweden)

    Cyril Velikanov

    2010-09-01

    Full Text Available In this paper we introduce our model of self-regulated mass online deliberation, and apply it to a context of cross-border deliberation involving translation of contributions between participating languages, and then to a context of cross-community online deliberation for dispute resolution, e.g. between opposing ethnic or religious communities. In such a cross-border or cross-community context, online deliberation should preferably progress as a sequence of segmented phases each followed by a combining phase. In a segmented phase, each community deliberates separately, and selects their best contributions for being presented to all other communities. Selection is made by using our proposed mechanism of mutual moderation and appraisal of contributions by participants themselves. In the subsequent combining phase, the selected contributions are translated (by volunteering or randomly selected participants among those who have specified appropriate language skills and presented to target segments for further appraisal and commenting. Our arguments in support of the proposed mutual moderation and appraisal procedures remain mostly speculative, as the whole subject of mass online self-regulatory deliberation still remains largely unexplored, and there exist no practical realisation of it .

  20. Homo Ignorans: Deliberately Choosing Not to Know.

    Science.gov (United States)

    Hertwig, Ralph; Engel, Christoph

    2016-05-01

    Western history of thought abounds with claims that knowledge is valued and sought. Yet people often choose not to know. We call the conscious choice not to seek or use knowledge (or information) deliberate ignorance. Using examples from a wide range of domains, we demonstrate that deliberate ignorance has important functions. We systematize types of deliberate ignorance, describe their functions, discuss their normative desirability, and consider how they can be modeled. To date, psychologists have paid relatively little attention to the study of ignorance, let alone the deliberate kind. Yet the desire not to know is no anomaly. It is a choice to seek rather than reduce uncertainty whose reasons require nuanced cognitive and economic theories and whose consequences-for the individual and for society-require analyses of both actor and environment. © The Author(s) 2016.

  1. Deliberate change without hierarchical influence?

    DEFF Research Database (Denmark)

    Nørskov, Sladjana; Kesting, Peter; Ulhøi, John Parm

    2017-01-01

    reveals that deliberate change is indeed achievable in a non-hierarchical collaborative OSS community context. However, it presupposes the presence and active involvement of informal change agents. The paper identifies and specifies four key drivers for change agents’ influence. Originality....../value The findings contribute to organisational analysis by providing a deeper understanding of the importance of leadership in making deliberate change possible in non-hierarchical settings. It points to the importance of “change-by-conviction”, essentially based on voluntary behaviour. This can open the door...

  2. Establishing Political Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2008-01-01

    The extension and transformation of political participation is dependent on widespread deliberation supported by information and communication technologies.  The most commonly found examples of these eParticipation systems are political discussion forums.  Though much of the discussion...... of these technologies is conducted in the eGovernment and (particularly) the eDemocracy literature, political discussion forums present a distinct set of design and management challenges which relate directly to IS concerns. In this article we analyze problems in establishing political deliberation systems under five...... headings: stakeholder engagement, web platform design, web platform management, political process re-shaping and evaluation and improvement. We review the existing literature and present a longitudinal case study of a political discussion forum: the Norwegian DemokratiTorget (Democracy Square).  We define...

  3. Association between PM2.5 and primary care visits due to asthma attack in Japan: relation to Beijing's air pollution episode in January 2013.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2014-03-01

    In January 2013, extremely high concentrations of fine particles (PM2.5) were observed around Beijing, China. In Japan, the health effects of transboundary air pollution have been a matter of concern. We examined the association between the levels of outdoor PM2.5 and other air pollutants with primary care visits (PCVs) at night due to asthma attack in Himeji City, western Japan. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan, involving 112 subjects aged 0-80 years who visited the clinic due to an asthma attack between 9 p.m. and 6 a.m. during the period January-March, 2013. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and some meteorological elements were measured, and a conditional logistic regression model was used to estimate the odds ratios (OR) of PCVs per unit increment in air pollutants or meteorological elements. Of the 112 subjects, 76 (68 %) were aged asthma attack at night. A positive relation between ozone and PCVs due to asthma attack was detected. The OR per 10 ppb increment in daily mean ozone the day before the visit was 2.31 (95 % confidence interval 1.16-4.61). These findings do not support an association between daily mean concentration of PM2.5 and PCVs at night. However, we did find evidence suggesting that ozone is associated with PCVs.

  4. Evaluation and perceived results of moral case deliberation: A mixed methods study.

    Science.gov (United States)

    Janssens, Rien M J P A; van Zadelhoff, Ezra; van Loo, Ger; Widdershoven, Guy A M; Molewijk, Bert A C

    2015-12-01

    Moral case deliberation is increasingly becoming part of various Dutch healthcare organizations. Although some evaluation studies of moral case deliberation have been carried out, research into the results of moral case deliberation within aged care is scarce. How did participants evaluate moral case deliberation? What has moral case deliberation brought to them? What has moral case deliberation contributed to care practice? Should moral case deliberation be further implemented and, if so, how? Quantitative analysis of a questionnaire study among participants of moral case deliberation, both caregivers and team leaders. Qualitative analysis of written answers to open questions, interview study and focus group meetings among caregivers and team leaders. Caregivers and team leaders in a large organization for aged care in the Netherlands. A total of 61 moral case deliberation sessions, carried out on 16 care locations belonging to the organization, were evaluated and perceived results were assessed. Participants gave informed consent and anonymity was guaranteed. In the Netherlands, the law does not prescribe independent ethical review by an Institutional Review Board for this kind of research among healthcare professionals. Moral case deliberation was evaluated positively by the participants. Content and atmosphere of moral case deliberation received high scores, while organizational issues regarding the moral case deliberation sessions scored lower and merit further attention. Respondents indicated that moral case deliberation has the potential to contribute to care practice as relationships among team members improve, more openness is experienced and more understanding for different perspectives is fostered. If moral case deliberation is to be successfully implemented, top-down approaches should go hand in hand with bottom-up approaches. The relevance of moral case deliberation for care practice received wide acknowledgement from the respondents. It can contribute

  5. The epistemic-teleologic model of deliberate self-persuasion.

    Science.gov (United States)

    Maio, Gregory R; Thomas, Geoff

    2007-02-01

    Although past theory and research point to the importance of understanding deliberate self-persuasion (i.e., deliberate self-induced attitude change), there have been no empirical and theoretical efforts to model this process. This article proposes a new model to help understand the process, while comparing the process of deliberate self-persuasion with relevant theory and research. The core feature of this model is a distinction between epistemic processes, which involve attempting to form new valid attitudes, and teleologic processes, which involve self-induced attitude change but with minimal concerns for validity. The epistemic processes employ tactics of reinterpretation, reattribution, reintegration, retesting, changing comparators, and changing dimensions of comparison. The teleologic processes include suppression, preemption, distraction, and concentration. By mapping these processes, this model helps to generate many novel and testable hypotheses about the use of deliberate self-persuasion to cope with ambivalent attitudes.

  6. Deliberating on intersectionality: women’s conferences in Recife

    Directory of Open Access Journals (Sweden)

    Maria-Hélène Sa Vilas Boas

    2015-12-01

    Full Text Available Under what conditions can deliberation include marginalized social groups? Several feminist authors criticize deliberative theory for reproducing power relations between social groups. They defend the explicit recognition of marginalized social groups within deliberative devices. This article aims to analyze the dynamics of deliberation when it gathers a traditionally underrepresented group, women. Based on the study of women’s conferences in Recife, it shows that the combination the politics of recognition and deliberation can lead both to the integration and marginalization of different actors within the group of women, depending on the resources they have available to voice their perspectives.

  7. Freedom of Expression, Deliberation, Autonomy and Respect

    DEFF Research Database (Denmark)

    Rostbøll, Christian F.

    2011-01-01

    This paper elaborates on the deliberative democracy argument for freedom of expression in terms of its relationship to different dimensions of autonomy. It engages the objection that Enlightenment theories pose a threat to cultures that reject autonomy and argues that autonomy-based democracy...... is not only compatible with but necessary for respect for cultural diversity. On the basis of an intersubjective epistemology, it argues that people cannot know how to live on mutually respectful terms without engaging in public deliberation and develop some degree of personal autonomy. While freedom...... of expression is indispensable for deliberation and autonomy, this does not mean that people have no obligations regarding how they speak to each other. The moral insights provided by deliberation depend on the participants in the process treating one another with respect. The argument is related to the Danish...

  8. Night-to-night arousal variability and interscorer reliability of arousal measurements.

    Science.gov (United States)

    Loredo, J S; Clausen, J L; Ancoli-Israel, S; Dimsdale, J E

    1999-11-01

    Measurement of arousals from sleep is clinically important, however, their definition is not well standardized, and little data exist on reliability. The purpose of this study is to determine factors that affect arousal scoring reliability and night-to-night arousal variability. The night-to-night arousal variability and interscorer reliability was assessed in 20 subjects with and without obstructive sleep apnea undergoing attended polysomnography during two consecutive nights. Five definitions of arousal were studied, assessing duration of electroencephalographic (EEG) frequency changes, increases in electromyographic (EMG) activity and leg movement, association with respiratory events, as well as the American Sleep Disorders Association (ASDA) definition of arousals. NA. NA. NA. Interscorer reliability varied with the definition of arousal and ranged from an Intraclass correlation (ICC) of 0.19 to 0.92. Arousals that included increases in EMG activity or leg movement had the greatest reliability, especially when associated with respiratory events (ICC 0.76 to 0.92). The ASDA arousal definition had high interscorer reliability (ICC 0.84). Reliability was lowest for arousals consisting of EEG changes lasting <3 seconds (ICC 0.19 to 0.37). The within subjects night-to-night arousal variability was low for all arousal definitions In a heterogeneous population, interscorer arousal reliability is enhanced by increases in EMG activity, leg movements, and respiratory events and decreased by short duration EEG arousals. The arousal index night-to-night variability was low for all definitions.

  9. Non-Conscious vs. Deliberate Dynamic Decision-Making—A Pilot Experiment

    OpenAIRE

    Andreas Größler; Etiënne Rouwette; Jac Vennix

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for deliberate cognitive processing), considerate decision-making (relatively long time for deliberate cognitive processing), and distracted decision-making (time for non-conscious cognitive processing ...

  10. Non-conscious vs. deliberate dynamic decision-making—a pilot experiment

    OpenAIRE

    Grössler, A.; Rouwette, E.A.J.A.; Vennix, J.A.M.; Größler, A.

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for deliberate cognitive processing), considerate decision-making (relatively long time for deliberate cognitive processing), and distracted decision-making (time for non-conscious cognitive processing ...

  11. The effects of deliberate practice in undergraduate medical education

    NARCIS (Netherlands)

    Moulaert, Véronique; Verwijnen, Maarten GM; Rikers, Remy; Scherpbier, Albert JJA

    2004-01-01

    INTRODUCTION: Ericsson and colleagues introduced the term 'deliberate practice' to describe training activities that are especially designed to maximise improvement. They stressed that how much one practises is as important as how one practises. Essential aspects of deliberate practice are the

  12. WORKSHOP: Discussion, debate, deliberation

    NARCIS (Netherlands)

    Jeliazkova, Margarita I.

    2014-01-01

    Discussing, deliberating and debating are a core part of any democratic process. To organise these processes well, a great deal of knowledge and skill is required. It is not simple to find a good balance between a number of elements: appropriate language and terminology; paying attention to solid

  13. Diagnosing night sweats.

    Science.gov (United States)

    Viera, Anthon J; Bond, Michael M; Yates, Scott W

    2003-03-01

    Night sweats are a common outpatient complaint, yet literature on the subject is scarce. Tuberculosis and lymphoma are diseases in which night sweats are a dominant symptom, but these are infrequently found to be the cause of night sweats in modern practice. While these diseases remain important diagnostic considerations in patients with night sweats, other diagnoses to consider include human immunodeficiency virus, gastroesophageal reflux disease, obstructive sleep apnea, hyperthyroidism, hypoglycemia, and several less common diseases. Antihypertensives, antipyretics, other medications, and drugs of abuse such as alcohol and heroin may cause night sweats. Serious causes of night sweats can be excluded with a thorough history, physical examination, and directed laboratory and radiographic studies. If a history and physical do not reveal a possible diagnosis, physicians should consider a purified protein derivative, complete blood count, human immunodeficiency virus test, thyroid-stimulating hormone test, erythrocyte sedimentation rate evaluation, chest radiograph, and possibly chest and abdominal computed tomographic scans and bone marrow biopsy.

  14. Curricular Deliberation about "Hamlet": An Exercise in the Practical.

    Science.gov (United States)

    Siegel, Judith Susan

    This study attempts to clarify and exploit Joseph Schwab's recent and current work on "practical" and "eclectic" curriculums in a simulated deliberation about a concrete curricular question, How might "Hamlet" be taught to one group of high school juniors? By exemplifying curricular deliberation, it aims to clarify…

  15. Personal Denial Of Service (PDOS Attacks: A Discussion and Exploration of a New Category of Cyber Crime

    Directory of Open Access Journals (Sweden)

    Michael Raymond Bartolacci

    2014-03-01

    Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack.  Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.

  16. Creating informed public opinion: citizen deliberation about nanotechnologies for human enhancements

    International Nuclear Information System (INIS)

    Cobb, Michael D.

    2011-01-01

    Many people believe that ordinary citizens should influence scientific and technological developments, but the American public is routinely uninformed about these issues. As a solution, some scholars advocate creating informed public opinions by encouraging citizens to deliberate about the issues. Although this idea is currently widely applauded in the science and technology literature, deliberative outcomes are infrequently measured and the practice of deliberation is routinely criticized in other disciplines. This research contributes to our understanding of the effectiveness of citizen deliberation as a method for increasing public engagement with science. I report data measuring results of deliberation in a national citizens’ technology forum (NCTF) about nanotechnologies for human enhancement. The NCTF was a month-long process involving six groups of 9–15 ordinary citizens who deliberated in different locations across the United States with the goal of reaching consensus about policy recommendations within their groups. I find that structured deliberation generated informed opinions, sometimes meaningful shifts in preferences, and increased trust and internal efficacy among the participants. Nevertheless, the NCTF has important shortcomings, and it is not obvious that consensus conferences should be preferred over other mechanisms for creating informed opinions. Future research is needed to corroborate the findings of this study and to systematically compare outcomes of structured citizen deliberation to other less resource intensive forms of engagement.

  17. Evaluation and perceived results of moral case deliberation: A mixed methods study

    NARCIS (Netherlands)

    Janssens, R.; van Zadelhoff, E.; van Loo, G.; Widdershoven, G.A.; Molewijk, A.C.

    2015-01-01

    Background: Moral case deliberation is increasingly becoming part of various Dutch healthcare organizations. Although some evaluation studies of moral case deliberation have been carried out, research into the results of moral case deliberation within aged care is scarce. Research questions: How did

  18. Minor Characters in William Shakespeare's Twelfth Night and A Midsummer Night's Dream

    Directory of Open Access Journals (Sweden)

    Zahraa Adnan Baqer

    2018-01-01

    Full Text Available This paper aims at discussing the role of the minor characters in William Shakespeare's Twelfth Night and A Midsummer Night's Dream. The study assumes that without the first group of minor characters, associated with Olivia, the play Twelfth Night would lose much of its humor, and without the second group, associated with Sebastian, the play would fall apart. On the other hand, in Shakespeare's A Midsummer Night's Dream minor characters play important roles, without them, the action dose not ran smoothly, or does not ran at all. The paper falls into three sections. Section one deals with the role of each minor character in Twelfth Night.  Section two focuses on the minor characters in A Midsummer Night's Dream. Section three is a conclusion which sums up the findings of the study.

  19. Deliberate self harm in children.

    Science.gov (United States)

    Krishnakumar, P; Geeta, M G; Riyaz, A

    2011-05-01

    To study the nature of deliberate self-harm (DSH) in children and to identify the associated factors. Child Guidance Clinic attached to the Department of Pediatrics of a teaching hospital in South India. Children with history of deliberate self harm who were referred to the CGC for psychological evaluation during a 10 year period. Children and parents were interviewed together and separately and details regarding age, sex, family and school environment, stresses and nature of self harm were documented. Psychiatric diagnosis was made based on DSM IV diagnostic criteria. Among the 30 children included in the study, 21 were boys and 9 were girls. Majority of children were between the ages of 11 and 13 years, the youngest being 6 years old. 76%of children had history of acute stressful life events and 62%of them had chronic ongoing stress. 62%of children had stress in the family and 41%had stress at school. Stress in the family included death of a parent, conflicts with parents or siblings, mental illness in the family, parental alcoholism and parental disharmony. Stress at school included conflicts with classmates, punishment or negative comments by teachers and learning problems. Psychiatric disorders were present in 52%of children, the commonest being depressive disorder. The commonest mode of DSH was self poisoning, and rat poison (zinc phosphide) was the commonest substance used. Deliberate self harm occurs in young children and the risk factors are comparable to those in adolescents.

  20. What’s There Not to ‘Like’? Sustainability Deliberations on Facebook

    Directory of Open Access Journals (Sweden)

    Roy Bendor

    2012-10-01

    Full Text Available Social media are considered ideal means to promote inclusive political participation by “reaching citizens where they are” in scalable and cost-effective ways. However, with all the excitement about the new virtual public sphere, little attention is given to the technical mediation itself – the affordances of e-deliberation platforms and the kind of interactions they support. In response, this paper aims to thicken the account of the interrelated political and technological contexts of e-deliberation. Using recent Facebook deliberations on sustainable transportation in Vancouver as our example, we argue that different rationales for public participation in policymaking animate different approaches to discourse, which, in turn, inform and are affected by different design and use strategies for e-deliberation platforms. Our argument suggests that the design affordances of e-deliberation represent opportunities to promote or curtail certain visions of a political culture of sustainability.

  1. Incidence Rates of Deliberate Self-Harm in Denmark 1994–2011

    DEFF Research Database (Denmark)

    Morthorst, Britt Reuter; Soegaard, Bodil; Nordentoft, Merete

    2016-01-01

    Background: The validity and reliability of suicide statistics have been questioned and few nationwide studies of deliberate selfharm have been presented. Aim: To calculate rates of deliberate self-harm in Denmark in order to investigate trends and assess the reliability of hospital records...... incidence of deliberate self-harm among young Danish women was observed, despite detection bias. An improved registration procedure of suicidal behavior is needed....

  2. Ethical case deliberation and decision making.

    Science.gov (United States)

    Gracia, Diego

    2003-01-01

    During the last thirty years different methods have been proposed in order to manage and resolve ethical quandaries, specially in the clinical setting. Some of these methodologies are based on the principles of Decision-making theory. Others looked to other philosophical traditions, like Principlism, Hermeneutics, Narrativism, Casuistry, Pragmatism, etc. This paper defends the view that deliberation is the cornerstone of any adequate methodology. This is due to the fact that moral decisions must take into account not only principles and ideas, but also emotions, values and beliefs. Deliberation is the process in which everyone concerned by the decision is considered a valid moral agent, obliged to give reasons for their own points of view, and to listen to the reasons of others. The goal of this process is not the reaching of a consensus but the enrichment of one's own point of view with that of the others, increasing in this way the maturity of one's own decision, in order to make it more wise or prudent. In many cases the members of a group of deliberation will differ in the final solution of the case, but the confrontation of their reasons will modify the perception of the problem of everyone. This is the profit of the process. Our moral decisions cannot be completely rational, due to the fact that they are influenced by feelings, values, beliefs, etc., but they must be reasonable, that is, wise and prudent. Deliberation is the main procedure to reach this goal. It obliges us to take others into account, respecting their different beliefs and values and prompting them to give reasons for their own points of view. This method has been traditional in Western clinical medicine all over its history, and it should be also the main procedure for clinical ethics.

  3. Adnyamathanha Night Skies

    Science.gov (United States)

    Curnow, Paul

    2009-06-01

    Aboriginal Australians have been viewing the night skies of Australia for some 45,000 years and possibly much longer. During this time they have been able to develop a complex knowledge of the night sky, the terrestrial environment in addition to seasonal changes. However, few of us in contemporary society have an in-depth knowledge of the nightly waltz of stars above.

  4. Sources of bias in clinical ethics case deliberation.

    Science.gov (United States)

    Magelssen, Morten; Pedersen, Reidar; Førde, Reidun

    2014-10-01

    A central task for clinical ethics consultants and committees (CEC) is providing analysis of, and advice on, prospective or retrospective clinical cases. However, several kinds of biases may threaten the integrity, relevance or quality of the CEC's deliberation. Bias should be identified and, if possible, reduced or counteracted. This paper provides a systematic classification of kinds of bias that may be present in a CEC's case deliberation. Six kinds of bias are discussed, with examples, as to their significance and risk factors. Possible remedies are suggested. The potential for bias is greater when the case deliberation is performed by an individual ethics consultant than when an entire clinical ethics committee is involved. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. Good Will: Cosmopolitan Education as a Site for Deliberation

    Science.gov (United States)

    Roth, Klas

    2011-01-01

    Why should we deliberate? I discuss a Kantian response to this query and argue that we cannot as rational beings avoid deliberation in principle; and that we have good reasons to consider the value and strength of Kant's philosophical investigations concerning fundamental moral issues and their relevance for the question of why we ought to…

  6. Bringing values and deliberation to science communication.

    Science.gov (United States)

    Dietz, Thomas

    2013-08-20

    Decisions always involve both facts and values, whereas most science communication focuses only on facts. If science communication is intended to inform decisions, it must be competent with regard to both facts and values. Public participation inevitably involves both facts and values. Research on public participation suggests that linking scientific analysis to public deliberation in an iterative process can help decision making deal effectively with both facts and values. Thus, linked analysis and deliberation can be an effective tool for science communication. However, challenges remain in conducting such process at the national and global scales, in enhancing trust, and in reconciling diverse values.

  7. Post Rio Communication Styles for Deliberation

    DEFF Research Database (Denmark)

    Holm, Jesper; Almlund, Pernille

    2015-01-01

    The communicative turn in planning, multi-layered governance and governmentality are analytical concepts from various schools of thought to comprehend the emergence of new types of publicprivate politics when it comes to complex, wicked issues such as sustainability or the 3rd wave of public health......: health promotion. The paper explores a research approach to compare two different policy communication tracks in order to conceive various impacts on deliberation. The tracks are constructed along the narratives individual-collective & consensus-conflictual in the discursive framing of political...... communication. We build on an ANT inspired methodology and look into two simultaneously evolving political agendas during the last two decades - sustainability and health promotion - that have framed communication efforts, campaigns and politics in general. How is public participation and deliberation...

  8. Cultivating Mathematical Skills: From Drill-and-Practice to Deliberate Practice

    Science.gov (United States)

    Lehtinen, Erno; Hannula-Sormunen, Minna; McMullen, Jake; Gruber, Hans

    2017-01-01

    Contemporary theories of expertise development highlight the crucial role of deliberate practice in the development of high level performance. Deliberate practice is practice that intentionally aims at improving one's skills and competencies. It is not a mechanical or repetitive process of making performance more fluid. Instead, it involves a…

  9. Sociopolitical drivers in the development of deliberate carbon storage

    Science.gov (United States)

    Stephens, Jennie C.

    The idea of engineering the storage of carbon released from fossil fuel burning in reservoirs other than the atmosphere has developed in the past 20 years from an obscure idea to an increasingly recognized potential approach that could be an important contributor to stabilizing atmospheric carbon dioxide (CO2) concentrations. Despite the intense application of scientific and technological expertise to the development of options for deliberate carbon storage, nontechnical factors play an important role. This chapter identifies sociopolitical, nontechnical factors that have contributed to the development of ideas and technologies associated with deliberate carbon storage. Broadly, interest in deliberate storage has expanded in response to increasing societal attention to reducing CO2 emissions for climate change mitigation. Specific societal groups, or stakeholders, which have contributed to the recent focus on carbon storage include the fossil fuel industry that has been shifting to a strategy of confronting rather than denying the CO2-climate change connection, a scientific community motivated by an increased sense of urgency of the need to reduce atmospheric CO2 concentrations, the general public with little knowledge about or awareness of carbon storage, and environmental advocacy groups that have demonstrated some divergence in levels of support for deliberate carbon storage. Among the policy mechanisms that have provided incentives for deliberate carbon storage are national accounting of carbon sources and sinks and carbon taxes. Another driver with particular importance in the United States is the political preference of some politicians to support development of advanced technologies for climate change mitigation rather than supporting mandatory CO2 regulations.

  10. History of the Night

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The definition of the night, as the period between sunset and sunrise, is consistent and unalterable, regardless of culture and time. However the perception of the night and its economic, social, and cultural roles are subject to change. Which parameters determine these changes? What can we learn by studying them about the specific character of a culture? Why do people experience the night in different ways in different historical periods and how did this affect their lives? How do references to nocturnal activities in historical sources (works of art, narratives) reveal what the artists/authors wish to communicate to their audiences? Can the night be a meaningful subject of historical and archaeological enquiry? A study of the source material in the Greek world (ca. 400 BC-ca. AD 400) shows a continuous effort to colonize the night with activities of the day, to make the night safer, more productive, more rational, more efficient. The main motors for this change were social developments and religion, no...

  11. How Should We Deliberate? Between the Argumentative and the Representative Dimensions of Democratic Deliberation

    Directory of Open Access Journals (Sweden)

    Tutui Viorel

    2012-01-01

    Full Text Available Abstract: My paper focuses on an important subject of the contemporary theory of democracy: what is the relationship between the argumentative and the representative dimensions of deliberative democracy? Using James Fishkin’s account of deliberative democracy and its relations with other democratic models I will argue that there is a severe conflict between these two dimensions: the attempt to enhance the value of argumentation presupposes a decrease in the representative value and the attempt to enhance the representative value results in a decrease in the argumentative value. This conflict is generated by what I call ‘the paradox of democratic deliberation’: the legitimacy of political decisions demands for the ‘raw’ opinion of the citizens, while the epistemic rightness of political decisions demands for a ‘filtered’ public opinion. But we cannot have both. In the final part of this paper I will sustain a moderate conception regarding the role of deliberation in democracy which offers us a way around this paradox but only at the price of significantly reducing the importance of deliberation.

  12. Ethical case deliberation on the ward. A comparison of four methods.

    NARCIS (Netherlands)

    Steinkamp, N.L.; Gordijn, B.

    2003-01-01

    The objective of this article is to analyse and compare four methods of ethical case deliberation. These include Clinical Pragmatism, The Nijmegen Method of ethical case deliberation, Hermeneutic dialogue, and Socratic dialogue. The origin of each method will be briefly sketched. Furthermore, the

  13. Suicide Following Deliberate Self-Harm.

    Science.gov (United States)

    Olfson, Mark; Wall, Melanie; Wang, Shuai; Crystal, Stephen; Gerhard, Tobias; Blanco, Carlos

    2017-08-01

    The authors sought to identify risk factors for repeat self-harm and completed suicide over the following year among adults with deliberate self-harm. A national cohort of Medicaid-financed adults clinically diagnosed with deliberate self-harm (N=61,297) was followed for up to 1 year. Repeat self-harm per 1,000 person-years and suicide rates per 100,000 person-years (based on cause of death information from the National Death Index) were determined. Hazard ratios of repeat self-harm and suicide were estimated by Cox proportional hazard models. During the 12 months after nonfatal self-harm, the rate of repeat self-harm was 263.2 per 1,000 person-years and the rate of completed suicide was 439.1 per 100,000 person-years, or 37.2 times higher than in a matched general population cohort. The hazard of suicide was higher after initial self-harm events involving violent as compared with nonviolent methods (hazard ratio=7.5, 95% CI=5.5-10.1), especially firearms (hazard ratio=15.86, 95% CI=10.7-23.4; computed with poisoning as reference), and to a lesser extent after events of patients who had recently received outpatient mental health care (hazard ratio=1.6, 95% CI=1.2-2.0). Compared with self-harm patients using nonviolent methods, those who used violent methods were at significantly increased risk of suicide during the first 30 days after the initial event (hazard ratio=17.5, 95% CI=11.2-27.3), but not during the following 335 days. Adults treated for deliberate self-harm frequently repeat self-harm in the following year. Patients who use a violent method for their initial self-harm, especially firearms, have an exceptionally high risk of suicide, particularly right after the initial event, which highlights the importance of careful assessment and close follow-up of this group.

  14. Ethical case deliberation on the ward. A comparison of four methods.

    Science.gov (United States)

    Steinkamp, Norbert; Gordijn, Bert

    2003-01-01

    The objective of this article is to analyse and compare four methods of ethical case deliberation. These include Clinical Pragmatism, The Nijmegen Method of ethical case deliberation, Hermeneutic dialogue, and Socratic dialogue. The origin of each method will be briefly sketched. Furthermore, the methods as well as the related protocols will be presented. Each method will then be evaluated against the background of those situations in which it is being used. The article aims to show that there is not one ideal method of ethical case deliberation, which fits to all possible kinds of moral problems. Rather, as each of the methods highlights a limited number of morally relevant aspects, each method has its strengths and weaknesses as well. These strengths and weaknesses should be evaluated in relation to different types of situations, for instance moral problems in treatment decisions, moral uneasiness and residue, and the like. The suggestion arrived at on the basis of the findings of this paper is a reasonable methodological plurality. This means that a method can be chosen depending on the type of moral problem to be deliberated upon. At the same time it means, that by means of a method, deliberation should be facilitated.

  15. "Chrono-functional milk": The difference between melatonin concentrations in night-milk versus day-milk under different night illumination conditions.

    Science.gov (United States)

    Asher, A; Shabtay, A; Brosh, A; Eitam, H; Agmon, R; Cohen-Zinder, M; Zubidat, A E; Haim, A

    2015-01-01

    Pineal melatonin (MLT) is produced at highest levels during the night, under dark conditions. We evaluated differences in MLT-concentration by comparing daytime versus night time milk samples, from two dairy farms with different night illumination conditions: (1) natural dark (Dark-Night); (2) short wavelength Artificial Light at Night (ALAN, Night-Illuminated). Samples were collected from 14 Israeli Holstein cows from each commercial dairy farm at 04:30 h ("Night-milk") 12:30 h ("Day-milk") and analyzed for MLT-concentration. In order to study the effects of night illumination conditions on cows circadian rhythms, Heart Rate (HR) daily rhythms were recorded. MLT-concentrations of Night-milk samples from the dark-night group were significantly (p Night-illuminated conditions (30.70 ± 1.79 and 17.81 ± 0.33 pg/ml, respectively). Interestingly, night illumination conditions also affected melatonin concentrations at daytime where under Dark-Night conditions values are significantly (p Night-Illuminated conditions, (5.36 ± 0.33 and 3.30 ± 0.18 pg/ml, respectively). There were no significant differences between the two treatments in the milk yield and milk composition except somatic cell count (SCC), which was significantly lower (p = 0.02) in the Dark-Night group compared with the Night-Illuminated group. Cows in both groups presented a significant (p night illuminated cows feeding and milking time are the "time keeper", while in the Dark-night cows, HR rhythms were entrained by the light/dark cycle. The higher MLT-concentration in Dark-night cows with the lower SCC values calls upon farmers to avoid exposure of cows to ALAN. Therefore, under Dark-night conditions milk quality will improve by lowering SCC values where separation between night and day of such milk can produce chrono-functional milk, naturally rich with MLT.

  16. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  17. How do different definitions of night shift affect the exposure assessment of night work?

    DEFF Research Database (Denmark)

    Garde, Anne Helene; Hansen, Johnni; Kolstad, Henrik A

    2016-01-01

    the reference definition (at least 3 h of work between 24:00 and 05:00) and definitions using a period during the night. The overlap with definitions based on starting and ending time was less pronounced (64-71 %). The proportion of classified night shifts differs little when night shifts are based...

  18. Night-vision goggles for night-blind subjects : subjective evaluation after 2 years of use

    NARCIS (Netherlands)

    Hartong, D. T.; Kooijman, A. C.

    Purpose: To evaluate the usefulness of night-vision goggles (NVG) for night-blind subjects after 1 and 2 years of use. Methods: Eleven night-blind subjects with retinitis pigmentosa used NVG for a 2-year period. At the end of each year, they were requested to fill-in two questionnaires regarding

  19. Deliberate Evolution in Multi-Agent Systems

    NARCIS (Netherlands)

    Brazier, F.M.; Jonker, C.M.; Treur, J.; Wijngaards, N.J.E.; Gabbay, D.

    2001-01-01

    Evolution in societies of agents is a challenging phenomenon, both from a fundamental perspective and from an applied perspective. In the literature often genetic programming approaches are used and relatively simple agents are considered, which have no deliberate influence on the direction of the

  20. Night shift work exposure profile and obesity: Baseline results from a Chinese night shift worker cohort.

    Science.gov (United States)

    Sun, Miaomiao; Feng, Wenting; Wang, Feng; Zhang, Liuzhuo; Wu, Zijun; Li, Zhimin; Zhang, Bo; He, Yonghua; Xie, Shaohua; Li, Mengjie; Fok, Joan P C; Tse, Gary; Wong, Martin C S; Tang, Jin-Ling; Wong, Samuel Y S; Vlaanderen, Jelle; Evans, Greg; Vermeulen, Roel; Tse, Lap Ah

    2018-01-01

    This study aimed to evaluate the associations between types of night shift work and different indices of obesity using the baseline information from a prospective cohort study of night shift workers in China. A total of 3,871 workers from five companies were recruited from the baseline survey. A structured self-administered questionnaire was employed to collect the participants' demographic information, lifetime working history, and lifestyle habits. Participants were grouped into rotating, permanent and irregular night shift work groups. Anthropometric parameters were assessed by healthcare professionals. Multiple logistic regression models were used to evaluate the associations between night shift work and different indices of obesity. Night shift workers had increased risk of overweight and obesity, and odds ratios (ORs) were 1.17 (95% CI, 0.97-1.41) and 1.27 (95% CI, 0.74-2.18), respectively. Abdominal obesity had a significant but marginal association with night shift work (OR = 1.20, 95% CI, 1.01-1.43). A positive gradient between the number of years of night shift work and overweight or abdominal obesity was observed. Permanent night shift work showed the highest odds of being overweight (OR = 3.94, 95% CI, 1.40-11.03) and having increased abdominal obesity (OR = 3.34, 95% CI, 1.19-9.37). Irregular night shift work was also significantly associated with overweight (OR = 1.56, 95% CI, 1.13-2.14), but its association with abdominal obesity was borderline (OR = 1.26, 95% CI, 0.94-1.69). By contrast, the association between rotating night shift work and these parameters was not significant. Permanent and irregular night shift work were more likely to be associated with overweight or abdominal obesity than rotating night shift work. These associations need to be verified in prospective cohort studies.

  1. Night shift work exposure profile and obesity: Baseline results from a Chinese night shift worker cohort

    Science.gov (United States)

    Feng, Wenting; Wang, Feng; Zhang, Liuzhuo; Wu, Zijun; Li, Zhimin; Zhang, Bo; He, Yonghua; Xie, Shaohua; Li, Mengjie; Fok, Joan P. C.; Tse, Gary; Wong, Martin C. S.; Tang, Jin-ling; Wong, Samuel Y. S.; Vlaanderen, Jelle; Evans, Greg; Vermeulen, Roel; Tse, Lap Ah

    2018-01-01

    Aims This study aimed to evaluate the associations between types of night shift work and different indices of obesity using the baseline information from a prospective cohort study of night shift workers in China. Methods A total of 3,871 workers from five companies were recruited from the baseline survey. A structured self-administered questionnaire was employed to collect the participants’ demographic information, lifetime working history, and lifestyle habits. Participants were grouped into rotating, permanent and irregular night shift work groups. Anthropometric parameters were assessed by healthcare professionals. Multiple logistic regression models were used to evaluate the associations between night shift work and different indices of obesity. Results Night shift workers had increased risk of overweight and obesity, and odds ratios (ORs) were 1.17 (95% CI, 0.97–1.41) and 1.27 (95% CI, 0.74–2.18), respectively. Abdominal obesity had a significant but marginal association with night shift work (OR = 1.20, 95% CI, 1.01–1.43). A positive gradient between the number of years of night shift work and overweight or abdominal obesity was observed. Permanent night shift work showed the highest odds of being overweight (OR = 3.94, 95% CI, 1.40–11.03) and having increased abdominal obesity (OR = 3.34, 95% CI, 1.19–9.37). Irregular night shift work was also significantly associated with overweight (OR = 1.56, 95% CI, 1.13–2.14), but its association with abdominal obesity was borderline (OR = 1.26, 95% CI, 0.94–1.69). By contrast, the association between rotating night shift work and these parameters was not significant. Conclusion Permanent and irregular night shift work were more likely to be associated with overweight or abdominal obesity than rotating night shift work. These associations need to be verified in prospective cohort studies. PMID:29763461

  2. It's not all about moral reasoning: Understanding the content of Moral Case Deliberation.

    Science.gov (United States)

    Svantesson, Mia; Silén, Marit; James, Inger

    2018-03-01

    Moral Case Deliberation is one form of clinical ethics support described as a facilitator-led collective moral reasoning by healthcare professionals on a concrete moral question connected to their practice. Evaluation research is needed, but, as human interaction is difficult to standardise, there is a need to capture the content beyond moral reasoning. This allows for a better understanding of Moral Case Deliberation, which may contribute to further development of valid outcome criteria and stimulate the normative discussion of what Moral Case Deliberation should contain. To explore and compare the content beyond moral reasoning in the dialogue in Moral Case Deliberation at Swedish workplaces. A mixed-methods approach was applied for analysing audio-recordings of 70 periodic Moral Case Deliberation meetings at 10 Swedish workplaces. Moral Case Deliberation facilitators and various healthcare professions participated, with registered nurses comprising the majority. Ethical considerations: No objection to the study was made by an Ethical Review Board. After oral and written information was provided, consent to be recorded was assumed by virtue of participation. Other than 'moral reasoning' (median (md): 45% of the spoken time), the Moral Case Deliberations consisted of 'reflections on the psychosocial work environment' to a varying extent (md: 29%). Additional content comprised 'assumptions about the patient's psychosocial situation' (md: 6%), 'facts about the patient's situation' (md: 5%), 'concrete problem-solving' (md: 6%) and 'process' (md: 3%). The findings suggest that a restorative function of staff's wellbeing in Moral Case Deliberation is needed, as this might contribute to good patient care. This supports outcome criteria of improved emotional support, which may include relief of moral distress. However, facilitators need a strategy for how to proceed from the participants' own emotional needs and to develop the use of their emotional knowing to focus on

  3. The role of deliberate practice in the acquisition of clinical skills

    Directory of Open Access Journals (Sweden)

    Duvivier Robbert J

    2011-12-01

    Full Text Available Abstract Background The role of deliberate practice in medical students' development from novice to expert was examined for preclinical skill training. Methods Students in years 1-3 completed 34 Likert type items, adapted from a questionnaire about the use of deliberate practice in cognitive learning. Exploratory factor analysis and reliability analysis were used to validate the questionnaire. Analysis of variance examined differences between years and regression analysis the relationship between deliberate practice and skill test results. Results 875 students participated (90%. Factor analysis yielded four factors: planning, concentration/dedication, repetition/revision, study style/self reflection. Student scores on 'Planning' increased over time, score on sub-scale 'repetition/revision' decreased. Student results on the clinical skill test correlated positively with scores on subscales 'planning' and 'concentration/dedication' in years 1 and 3, and with scores on subscale 'repetition/revision' in year 1. Conclusions The positive effects on test results suggest that the role of deliberate practice in medical education merits further study. The cross-sectional design is a limitation, the large representative sample a strength of the study. The vanishing effect of repetition/revision may be attributable to inadequate feedback. Deliberate practice advocates sustained practice to address weaknesses, identified by (self-assessment and stimulated by feedback. Further studies should use a longitudinal prospective design and extend the scope to expertise development during residency and beyond.

  4. Night Eating Disorders

    Directory of Open Access Journals (Sweden)

    Deniz Tuncel

    2009-08-01

    Full Text Available Hunger is an awakening related biological impulse. The relationship between hunger and sleep is moderated by the control of homeostatic and circadian rhytms of the body. Abnormal eating behavior during sleep period could result from different causes. Abnormal eating during the main sleep period has been categorized as either night eating syndrome or sleep related eating disorder. Night eating syndrome (NES is an eating disorder characterised by the clinical features of morning anorexia, evening hyperphagia, and insomnia with awakenings followed by nocturnal food ingestion. Recently night eating syndrome, conceptualized as a delayed circadian intake of food. Sleep-related eating disorder, thought to represent a parasomnia and as such included within the revised International Classification of Sleep Disorders (ICSD-2, and characterized by nocturnal partial arousals associated with recurrent episodes of involuntary food consumption and altered levels of consciousness. Whether, however, sleep-related eating disorder and night eating syndrome represent different diseases or are part of a continuum is still debated. This review summarizes their characteristics, treatment outcomes and differences between them.

  5. A Midsummer Night's Science

    CERN Multimedia

    2001-01-01

    Last year, the first Science Night attracted nearly 1500 people. Dipping into history for the space of one night? This is the idea of Geneva's Museum of the History of Science, which is organizing its second Science Night, on 7 and 8 July, on the history of science. The first such event, held last year, was a considerable success with almost 15 000 visitors. The second Science Night, to be held in the magnificent setting of the Perle du Lac Park in Geneva, promises to be a winner too. By making science retell its own history, this major event is intended to show how every scientific and technical breakthrough is the culmination of a long period of growth that began hundreds of years in the past. Dozens of activities and events are included in this programme of time travel: visitors can study the night sky through telescopes and see what Galileo first observed, and then go to see a play on the life of the Italian scientist. Another play, commissioned specially for the occasion, will honour Geneva botanist De ...

  6. Freedom of Expression, Deliberation, Autonomy, and Respect

    DEFF Research Database (Denmark)

    Rostbøll, Christian Fogh

    for freedom of expression in terms of its relationship to different dimensions of autonomy. In response to the objection that Enlightenment theories pose a threat to cultures that reject autonomy, it is argued that autonomy-based democracy is not only compatible with but necessary for respect for cultural......The strongest versions of the democracy argument for freedom of expression rely on the deliberative conception of democracy. Deliberative democracy entails both an ideal of political autonomy and of autonomous preference formation. This paper elaborates the deliberative democracy argument...... diversity. On the basis of an intersubjective epistemology, I argue that citizens cannot know how to live on mutually respectful terms without engaging in public deliberation. Moreover, to be successful deliberation must foster some degree of personal autonomy, at least the ability to distinguish what...

  7. In the public interest: assessing expert and stakeholder influence in public deliberation about biobanks.

    Science.gov (United States)

    MacLean, Samantha; Burgess, Michael M

    2010-07-01

    Providing technical and experiential information without overwhelming participants' perspectives presents a major challenge to public involvement in policy decisions. This article reports the design and analysis of a case study on incorporating expert and stakeholder knowledge without including them as deliberators, while supporting deliberative participants' ability to introduce and critically assess different perspectives. Analysis of audio-recorded deliberations illustrates how expert and stakeholder knowledge was cited, criticized and incorporated into deliberations. In conclusion, separating experts and stakeholders from deliberations may be an important prima facie principle when the goal is to enhance citizen representation on technical issues and related policy.

  8. Using deliberation to address controversial issues: Developing Holocaust education curriculum.

    Directory of Open Access Journals (Sweden)

    THOMAS MISCO

    2007-10-01

    Full Text Available This paper explores how a cross-cultural project responded to the need for new Holocaust educational materials for the Republic of Latvia through the method of curriculum deliberation. Analysis of interview, observational, and document data drawn from seven curriculum writers and numerous project members suggest that curriculum deliberation helped awaken a controversial and silenced history while attending to a wide range of needs and concerns for a variety of stakeholders. The findings highlight structural features that empowered the curriculum writers as they engaged in protracted rumination, reflected upon competing norms, and considered the nuances of the curriculum problem in relation to implementation. Understanding the process, challenges, and promises of cross-cultural curriculum deliberation holds significance for educators, curricularists, and educational researchers wishing to advance teaching and learning within silenced histories and controversial issues.

  9. Aristotle on Deliberation:Its Place in Ethics, Politics and Rhetoric

    OpenAIRE

    Kock, Christian Erik J

    2014-01-01

    Aristotle differs from most later philosophers in distinguishing clearly between epistemic reasoning, which aims for truth, and practical reasoning, which does not. How can he posit this distinction and yet not dismiss practical reasoning as flattery and manipulation, as Plato did? The answer lies in the concepts of deliberation (boulē, bouleusis) and deliberate choice (proairesis). They link Aristotle's rhetoric, ethics, and politics together and help provide definitions of all three: Ethics...

  10. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  11. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  12. How deliberation makes better citizens

    DEFF Research Database (Denmark)

    Hansen, Kasper Møller; Normann Andersen, Vibeke

    2007-01-01

    This article presents results from a Danish national Deliberative Poll on the single European currency. A representative sample of 364 Danish citizens assembled to deliberate on Denmark's participation in the single currency. As a quasi-experiment, the Deliberative Poll is an example of deliberat...... emphasizes the need for further elaboration of the theory of deliberative democracy so that it better reflects these features of ‘real-life' politics....

  13. Neural basis of moral verdict and moral deliberation

    Science.gov (United States)

    Borg, Jana Schaich; Sinnott-Armstrong, Walter; Calhoun, Vince D.; Kiehl, Kent A.

    2011-01-01

    How people judge something to be morally right or wrong is a fundamental question of both the sciences and the humanities. Here we aim to identify the neural processes that underlie the specific conclusion that something is morally wrong. To do this, we introduce a novel distinction between “moral deliberation,” or the weighing of moral considerations, and the formation of a “moral verdict,” or the commitment to one moral conclusion. We predict and identify hemodynamic activity in the bilateral anterior insula and basal ganglia that correlates with committing to the moral verdict “this is morally wrong” as opposed to “this is morally not wrong,” a finding that is consistent with research from economic decision-making. Using comparisons of deliberation-locked vs. verdict-locked analyses, we also demonstrate that hemodynamic activity in high-level cortical regions previously implicated in morality—including the ventromedial prefrontal cortex, posterior cingulate, and temporoparietal junction—correlates primarily with moral deliberation as opposed to moral verdicts. These findings provide new insights into what types of processes comprise the enterprise of moral judgment, and in doing so point to a framework for resolving why some clinical patients, including psychopaths, may have intact moral judgment but impaired moral behavior. PMID:21590588

  14. Determinants of day-night difference in blood pressure, a comparison with determinants of daytime and night-time blood pressure.

    Science.gov (United States)

    Musameh, M D; Nelson, C P; Gracey, J; Tobin, M; Tomaszewski, M; Samani, N J

    2017-01-01

    Blunted day-night difference in blood pressure (BP) is an independent cardiovascular risk factor, although there is limited information on determinants of diurnal variation in BP. We investigated determinants of day-night difference in systolic (SBP) and diastolic (DBP) BP and how these compared with determinants of daytime and night-time SBP and DBP. We analysed the association of mean daytime, mean night-time and mean day-night difference (defined as (mean daytime-mean night-time)/mean daytime) in SBP and DBP with clinical, lifestyle and biochemical parameters from 1562 adult individuals (mean age 38.6) from 509 nuclear families recruited in the GRAPHIC Study. We estimated the heritability of the various BP phenotypes. In multivariate analysis, there were significant associations of age, sex, markers of adiposity (body mass index and waist-hip ratio), plasma lipids (total and low-density lipoprotein cholesterol and triglycerides), serum uric acid, alcohol intake and current smoking status on daytime or night-time SBP and/or DBP. Of these, only age (P=4.7 × 10 -5 ), total cholesterol (P=0.002), plasma triglycerides (P=0.006) and current smoking (P=3.8 × 10 -9 ) associated with day-night difference in SBP, and age (P=0.001), plasma triglyceride (P=2.2 × 10 -5 ) and current smoking (3.8 × 10 -4 ) associated with day-night difference in DBP. 24-h, daytime and night-time SBP and DBP showed substantial heritability (ranging from 18-43%). In contrast day-night difference in SBP showed a lower heritability (13%) while heritability of day-night difference in DBP was not significant. These data suggest that specific clinical, lifestyle and biochemical factors contribute to inter-individual variation in daytime, night-time and day-night differences in SBP and DBP. Variation in day-night differences in BP is largely non-genetic.

  15. Determinants of day–night difference in blood pressure, a comparison with determinants of daytime and night-time blood pressure

    Science.gov (United States)

    Musameh, M D; Nelson, C P; Gracey, J; Tobin, M; Tomaszewski, M; Samani, N J

    2017-01-01

    Blunted day–night difference in blood pressure (BP) is an independent cardiovascular risk factor, although there is limited information on determinants of diurnal variation in BP. We investigated determinants of day–night difference in systolic (SBP) and diastolic (DBP) BP and how these compared with determinants of daytime and night-time SBP and DBP. We analysed the association of mean daytime, mean night-time and mean day–night difference (defined as (mean daytime−mean night-time)/mean daytime) in SBP and DBP with clinical, lifestyle and biochemical parameters from 1562 adult individuals (mean age 38.6) from 509 nuclear families recruited in the GRAPHIC Study. We estimated the heritability of the various BP phenotypes. In multivariate analysis, there were significant associations of age, sex, markers of adiposity (body mass index and waist–hip ratio), plasma lipids (total and low-density lipoprotein cholesterol and triglycerides), serum uric acid, alcohol intake and current smoking status on daytime or night-time SBP and/or DBP. Of these, only age (P=4.7 × 10−5), total cholesterol (P=0.002), plasma triglycerides (P=0.006) and current smoking (P=3.8 × 10−9) associated with day–night difference in SBP, and age (P=0.001), plasma triglyceride (P=2.2 × 10−5) and current smoking (3.8 × 10−4) associated with day–night difference in DBP. 24-h, daytime and night-time SBP and DBP showed substantial heritability (ranging from 18–43%). In contrast day–night difference in SBP showed a lower heritability (13%) while heritability of day–night difference in DBP was not significant. These data suggest that specific clinical, lifestyle and biochemical factors contribute to inter-individual variation in daytime, night-time and day–night differences in SBP and DBP. Variation in day–night differences in BP is largely non-genetic. PMID:26984683

  16. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  17. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  18. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  19. Psychosocial therapy and causes of death after deliberate self-harm

    DEFF Research Database (Denmark)

    Birkbak, J; Stuart, E A; Lind, B D

    2016-01-01

    BACKGROUND: Psychosocial therapy after deliberate self-harm might be associated with reduced risk of specific causes of death. METHOD: In this matched cohort study, we included patients, who after an episode of deliberate self-harm received psychosocial therapy at a Suicide Prevention Clinic...... in Denmark between 1992 and 2010. We used propensity score matching in a 1:3 ratio to select a comparison group from 59 046 individuals who received standard care. National Danish registers supplied data on specific causes of death over a 20-year follow-up period. RESULTS: At the end of follow-up, 391 (6.......5-448.4) for mental or behavioural disorders as a cause of death, 111.1 (95% CI 79.2-210.5) for alcohol-related causes and 96.8 (95% CI 69.1-161.8) for other diseases and medical conditions. CONCLUSIONS: Our findings indicate that psychosocial therapy after deliberate self-harm might reduce long-term risk of death...

  20. Sustainability and deliberate transition of socio-technical systems

    DEFF Research Database (Denmark)

    Hansen, Ole Erik; Søndergård, Bent; Stærdahl, Jens

    or developing socio-technical systems in order to integrate the concept of sustainability as a driver for the deliberate and purposeful shaping and transition. The article discusses the requirements to effective governance networks and governing of governance networks. Research within innovation systems......The article suggests that deliberate planning for sustainability demands a focus on the transition of socio-technical systems in order to establish robust and more sustainable patterns of production and consumption. This implies the necessity of a new perspective for environmental planning......, transition management and technology systems combined with planning and experimental activities provides both a theoretical and empirical body of knowledge of such governance processes. The article discusses how this perspective can be used in relation to the process of developing bio-fuel systems...

  1. Night Eating Disorders

    OpenAIRE

    Deniz Tuncel; Fatma Özlem Orhan

    2009-01-01

    Hunger is an awakening related biological impulse. The relationship between hunger and sleep is moderated by the control of homeostatic and circadian rhytms of the body. Abnormal eating behavior during sleep period could result from different causes. Abnormal eating during the main sleep period has been categorized as either night eating syndrome or sleep related eating disorder. Night eating syndrome (NES) is an eating disorder characterised by the clinical features of morning anorexia, even...

  2. "While you still think, I already type": experienced social power reduces deliberation during e-mail communication.

    Science.gov (United States)

    Scholl, Annika; Sassenberg, Kai

    2014-11-01

    E-mail allows individuals to deliberate on their communication before sending it off. For instance, communication partners can easily take their time to ponder how best to frame a request before they actually send a message. Individuals at times strategically exploit this opportunity to deliberate in order to tailor messages to their communication partner, such as when communicating with a relatively more powerful person. As social power reduces concerns about impression management, we predicted that individuals deliberate more while composing e-mail messages under low (vs. high) power. This assumption was tested with well-established power priming. As such, we expected that experienced power in one context would diminish deliberation times during a subsequent e-mail communication. An experiment manipulating the experience of (low vs. high) power and measuring deliberation times during e-mail composition supported this hypothesis. The findings thus indicate how social power alters deliberation times. More importantly, the results show that individuals not only strategically deliberate during e-mail communication in line with their current situation, but also in line with their social standing in a previous situation (here, their experience of power).

  3. Late night activity regarding stroke codes: LuNAR strokes.

    Science.gov (United States)

    Tafreshi, Gilda; Raman, Rema; Ernstrom, Karin; Rapp, Karen; Meyer, Brett C

    2012-08-01

    There is diurnal variation for cardiac arrest and sudden cardiac death. Stroke may show a similar pattern. We assessed whether strokes presenting during a particular time of day or night are more likely of vascular etiology. To compare emergency department stroke codes arriving between 22:00 and 8:00 hours (LuNAR strokes) vs. others (n-LuNAR strokes). The purpose was to determine if late night strokes are more likely to be true strokes or warrant acute tissue plasminogen activator evaluations. We reviewed prospectively collected cases in the University of California, San Diego Stroke Team database gathered over a four-year period. Stroke codes at six emergency departments were classified based on arrival time. Those arriving between 22:00 and 8:00 hours were classified as LuNAR stroke codes, the remainder were classified as 'n-LuNAR'. Patients were further classified as intracerebral hemorrhage, acute ischemic stroke not receiving tissue plasminogen activator, acute ischemic stroke receiving tissue plasminogen activator, transient ischemic attack, and nonstroke. Categorical outcomes were compared using Fisher's Exact test. Continuous outcomes were compared using Wilcoxon's Rank-sum test. A total of 1607 patients were included in our study, of which, 299 (19%) were LuNAR code strokes. The overall median NIHSS was five, higher in the LuNAR group (n-LuNAR 5, LuNAR 7; P=0·022). There was no overall differences in patient diagnoses between LuNAR and n-LuNAR strokes (P=0·169) or diagnosis of acute ischemic stroke receiving tissue plasminogen activator (n-LuNAR 191 (14·6%), LuNAR 42 (14·0%); P=0·86). Mean arrival to computed tomography scan time was longer during LuNAR hours (n-LuNAR 54·9±76·3 min, LuNAR 62·5±87·7 min; P=0·027). There was no significant difference in 90-day mortality (n-LuNAR 15·0%, LuNAR 13·2%; P=0·45). Our stroke center experience showed no difference in diagnosis of acute ischemic stroke between day and night stroke codes. This

  4. Night shift work and modifiable lifestyle factors.

    Science.gov (United States)

    Pepłońska, Beata; Burdelak, Weronika; Krysicka, Jolanta; Bukowska, Agnieszka; Marcinkiewicz, Andrzej; Sobala, Wojciech; Klimecka-Muszyńska, Dorota; Rybacki, Marcin

    2014-10-01

    Night shift work has been linked to some chronic diseases. Modification of lifestyle by night work may partially contribute to the development of these diseases, nevertheless, so far epidemiological evidence is limited. The aim of the study was to explore association between night shift work and lifestyle factors using data from a cross-sectional study among blue-collar workers employed in industrial plants in Łódź, Poland. The anonymous questionnaire was self-administered among 605 employees (236 women and 369 men, aged 35 or more) - 434 individuals currently working night shifts. Distribution of the selected lifestyle related factors such as smoking, alcohol drinking, physical activity, body mass index (BMI), number of main meals and the hour of the last meal was compared between current, former, and never night shift workers. Adjusted ORs or predicted means were calculated, as a measure of the associations between night shift work and lifestyle factors, with age, marital status and education included in the models as covariates. Recreational inactivity (defined here as less than one hour per week of recreational physical activity) was associated with current night shift work when compared to never night shift workers (OR = 2.43, 95% CI: 1.13-5.22) among men. Alcohol abstinence and later time of the last meal was associated with night shift work among women. Statistically significant positive relationship between night shift work duration and BMI was observed among men (p = 0.029). This study confirms previous studies reporting lower exercising among night shift workers and tendency to increase body weight. This finding provides important public health implication for the prevention of chronic diseases among night shift workers. Initiatives promoting physical activity addressed in particular to the night shift workers are recommended.

  5. Night shift work and modifiable lifestyle factors

    Directory of Open Access Journals (Sweden)

    Beata Pepłońska

    2014-10-01

    Full Text Available Objectives: Night shift work has been linked to some chronic diseases. Modification of lifestyle by night work may partially contribute to the development of these diseases, nevertheless, so far epidemiological evidence is limited. The aim of the study was to explore association between night shift work and lifestyle factors using data from a cross-sectional study among blue-collar workers employed in industrial plants in Łódź, Poland. Material and Methods: The anonymous questionnaire was self-administered among 605 employees (236 women and 369 men, aged 35 or more - 434 individuals currently wor­king night shifts. Distribution of the selected lifestyle related factors such as smoking, alcohol drinking, physical activity, body mass index (BMI, number of main meals and the hour of the last meal was compared between current, former, and never night shift workers. Adjusted ORs or predicted means were calculated, as a measure of the associations between night shift work and lifestyle factors, with age, marital status and education included in the models as covariates. Results: Recreational inactivity (defined here as less than one hour per week of recreational physical activity was associated with current night shift work when compared to never night shift workers (OR = 2.43, 95% CI: 1.13-5.22 among men. Alcohol abstinence and later time of the last meal was associated with night shift work among women. Statistically significant positive relationship between night shift work duration and BMI was observed among men (p = 0.029. Conclusions: This study confirms previous studies reporting lower exercising among night shift workers and tendency to increase body weight. This finding provides important public health implication for the prevention of chronic diseases among night shift workers. Initiatives promoting physical activity addressed in particular to the night shift workers are recommended.

  6. Night and day in the VA: associations between night shift staffing, nurse workforce characteristics, and length of stay.

    Science.gov (United States)

    de Cordova, Pamela B; Phibbs, Ciaran S; Schmitt, Susan K; Stone, Patricia W

    2014-04-01

    In hospitals, nurses provide patient care around the clock, but the impact of night staff characteristics on patient outcomes is not well understood. The aim of this study was to examine the association between night nurse staffing and workforce characteristics and the length of stay (LOS) in 138 veterans affairs (VA) hospitals using panel data from 2002 through 2006. Staffing in hours per patient day was higher during the day than at night. The day nurse workforce had more educational preparation than the night workforce. Nurses' years of experience at the unit, facility, and VA level were greater at night. In multivariable analyses controlling for confounding variables, higher night staffing and a higher skill mix were associated with reduced LOS. © 2014 Wiley Periodicals, Inc.

  7. Cognitive-behavioural therapy for deliberate self-harm

    NARCIS (Netherlands)

    Slee, Nadja

    2008-01-01

    This thesis describes the outcomes of a randomized controlled trial of a Cognitive Behavioural Therapy (CBT) intervention for patients who engage in Deliberate Self-Harm (DSH). The CBT intervention was designed to supplement usual care following an episode of DSH. The study involved 90 people (95%

  8. Research opportunities in simulation-based medical education using deliberate practice.

    Science.gov (United States)

    McGaghie, William C

    2008-11-01

    There are many opportunities for the academic emergency medicine (EM) community to engage in simulation-based educational research using deliberate practice (DP). This article begins by defining and giving examples of two key concepts: deliberate practice and mastery learning. The article proceeds to report six lessons learned from a research legacy in simulation-based medical education (SBME). It concludes by listing and amplifying 10 DP research opportunities in academic EM. A coda states that the research agenda is rich and ambitious and should focus on the goal of educating superb, expert clinicians.

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Conscious thought beats deliberation without attention in diagnostic decision-making: at least when you are an expert.

    Science.gov (United States)

    Mamede, Sílvia; Schmidt, Henk G; Rikers, Remy M J P; Custers, Eugene J F M; Splinter, Ted A W; van Saase, Jan L C M

    2010-11-01

    Contrary to what common sense makes us believe, deliberation without attention has recently been suggested to produce better decisions in complex situations than deliberation with attention. Based on differences between cognitive processes of experts and novices, we hypothesized that experts make in fact better decisions after consciously thinking about complex problems whereas novices may benefit from deliberation-without-attention. These hypotheses were confirmed in a study among doctors and medical students. They diagnosed complex and routine problems under three conditions, an immediate-decision condition and two delayed conditions: conscious thought and deliberation-without-attention. Doctors did better with conscious deliberation when problems were complex, whereas reasoning mode did not matter in simple problems. In contrast, deliberation-without-attention improved novices' decisions, but only in simple problems. Experts benefit from consciously thinking about complex problems; for novices thinking does not help in those cases.

  11. Deliberate practice and performance in music, games, sports, education, and professions: a meta-analysis.

    Science.gov (United States)

    Macnamara, Brooke N; Hambrick, David Z; Oswald, Frederick L

    2014-08-01

    More than 20 years ago, researchers proposed that individual differences in performance in such domains as music, sports, and games largely reflect individual differences in amount of deliberate practice, which was defined as engagement in structured activities created specifically to improve performance in a domain. This view is a frequent topic of popular-science writing-but is it supported by empirical evidence? To answer this question, we conducted a meta-analysis covering all major domains in which deliberate practice has been investigated. We found that deliberate practice explained 26% of the variance in performance for games, 21% for music, 18% for sports, 4% for education, and less than 1% for professions. We conclude that deliberate practice is important, but not as important as has been argued. © The Author(s) 2014.

  12. Deliberate practice predicts performance over time in adolescent chess players and drop-outs: a linear mixed models analysis.

    Science.gov (United States)

    de Bruin, Anique B H; Smits, Niels; Rikers, Remy M J P; Schmidt, Henk G

    2008-11-01

    In this study, the longitudinal relation between deliberate practice and performance in chess was examined using a linear mixed models analysis. The practice activities and performance ratings of young elite chess players, who were either in, or had dropped out of the Dutch national chess training, were analysed since they had started playing chess seriously. The results revealed that deliberate practice (i.e. serious chess study alone and serious chess play) strongly contributed to chess performance. The influence of deliberate practice was not only observable in current performance, but also over chess players' careers. Moreover, although the drop-outs' chess ratings developed more slowly over time, both the persistent and drop-out chess players benefited to the same extent from investments in deliberate practice. Finally, the effect of gender on chess performance proved to be much smaller than the effect of deliberate practice. This study provides longitudinal support for the monotonic benefits assumption of deliberate practice, by showing that over chess players' careers, deliberate practice has a significant effect on performance, and to the same extent for chess players of different ultimate performance levels. The results of this study are not in line with critique raised against the deliberate practice theory that the factors deliberate practice and talent could be confounded.

  13. Oxidative DNA damage during night shift work.

    Science.gov (United States)

    Bhatti, Parveen; Mirick, Dana K; Randolph, Timothy W; Gong, Jicheng; Buchanan, Diana Taibi; Zhang, Junfeng Jim; Davis, Scott

    2017-09-01

    We previously reported that compared with night sleep, day sleep among shift workers was associated with reduced urinary excretion of 8-hydroxydeoxyguanosine (8-OH-dG), potentially reflecting a reduced ability to repair 8-OH-dG lesions in DNA. We identified the absence of melatonin during day sleep as the likely causative factor. We now investigate whether night work is also associated with reduced urinary excretion of 8-OH-dG. For this cross-sectional study, 50 shift workers with the largest negative differences in night work versus night sleep circulating melatonin levels (measured as 6-sulfatoxymelatonin in urine) were selected from among the 223 shift workers included in our previous study. 8-OH-dG concentrations were measured in stored urine samples using high performance liquid chromatography with electrochemical detection. Mixed effects models were used to compare night work versus night sleep 8-OH-dG levels. Circulating melatonin levels during night work (mean=17.1 ng/mg creatinine/mg creatinine) were much lower than during night sleep (mean=51.7 ng/mg creatinine). In adjusted analyses, average urinary 8-OH-dG levels during the night work period were only 20% of those observed during the night sleep period (95% CI 10% to 30%; psleep, is associated with reduced repair of 8-OH-dG lesions in DNA and that the effect is likely driven by melatonin suppression occurring during night work relative to night sleep. If confirmed, future studies should evaluate melatonin supplementation as a means to restore oxidative DNA damage repair capacity among shift workers. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A...Program Name Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A) DoD Component Air Force Responsible Office Program...APB) dated March 9, 2015 DCAPES Inc 2A 2016 MAR UNCLASSIFIED 4 Program Description Deliberate and Crisis Action Planning and Execution Segments

  15. Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B...Information Program Name Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B) DoD Component Air Force Responsible Office...been established. DCAPES Inc 2B 2016 MAR UNCLASSIFIED 4 Program Description Deliberate and Crisis Action Planning and Execution Segments (DCAPES) is

  16. Non-Conscious vs. Deliberate Dynamic Decision-Making—A Pilot Experiment

    Directory of Open Access Journals (Sweden)

    Andreas Größler

    2016-02-01

    Full Text Available The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for deliberate cognitive processing, considerate decision-making (relatively long time for deliberate cognitive processing, and distracted decision-making (time for non-conscious cognitive processing only. As experimental stimulus, a simulator based on the Kaibab Plateau model was employed. With a sample size of more than 100 experimental participants, group differences are not significant for most data examined. Implications comprise the formulation of a framework to guide further research. The value of this paper lies in the fact that it connects to a recent discussion in psychology and transfers it to a domain in the core interest of the system community: decision-making in situations with dynamic complexity. Furthermore, it offers a range of improvement points for potential follow-up studies.

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  19. Organization and management of ATLAS nightly builds

    International Nuclear Information System (INIS)

    Luehring, F; Obreshkov, E; Quarrie, D; Rybkine, G; Undrus, A

    2010-01-01

    The automated multi-platform software nightly build system is a major component in the ATLAS collaborative software organization, validation and code approval schemes. Code developers from ATLAS participating Institutes spread all around the world use about 30 branches of nightly releases for testing new packages, verification of patches to existing software, and migration to new platforms and compilers. The nightly releases lead up to, and are the basis of, stable software releases used for data processing worldwide. The ATLAS nightly builds are managed by the fully automated NICOS framework on the computing farm with 44 powerful multiprocessor nodes. The ATN test tool is embedded within the nightly system and provides results shortly after full compilations complete. Other test frameworks are synchronized with NICOS jobs and run larger scale validation jobs using the nightly releases. NICOS web pages dynamically provide information about the progress and results of the builds. For faster feedback, E-mail notifications about nightly releases problems are automatically distributed to the developers responsible.

  20. The influence of deliberate practice on musical achievement: A meta-analysis

    Directory of Open Access Journals (Sweden)

    Friedrich ePlatz

    2014-06-01

    Full Text Available Deliberate practice (DP is a task-specific structured training activity that plays a key role in understanding skill acquisition and explaining individual differences in expert performance. Relevant activities that qualify as DP have to be identified in every domain. For example, for training in classical music, solitary practice is a typical training activity during skill acquisition. To date, no meta-analysis on the quantifiable effect size of deliberate practice on attained performance in music has been conducted. Yet the identification of a quantifiable effect size could be relevant for the current discussion on the role of various factors on individual difference in musical achievement. Furthermore, a research synthesis might enable new computational approaches to musical development. Here we present the first meta-analysis on the role of deliberate practice in the domain of musical performance. A final sample size of 13 studies (total N = 788 was carefully extracted to satisfy the following criteria: reported durations of task-specific accumulated practice as predictor variables and objectively assessed musical achievement as the target variable. We identified an aggregated effect size of rc = .61; 95% CI [.54, .67] for the relationship between task-relevant practice (which by definition includes DP and musical achievement. Our results corroborate the central role of long-term (deliberate practice for explaining expert performance in music.

  1. The prevalence of self-reported deliberate self harm in Irish adolescents.

    LENUS (Irish Health Repository)

    Morey, Carolyn

    2008-01-01

    BACKGROUND: Deliberate self harm is major public health problem, in particular among young people. Although several studies have addressed the prevalence of deliberate self harm among young people in the community, little is known about the extent to which deliberate self harm comes to the attention of medical services, the self harm methods used and the underlying motives. The aim of this study was to determine the prevalence of deliberate self harm in adolescents and the methods, motives and help seeking behaviour associated with this behaviour. METHODS: A cross-sectional survey using an anonymous self-report questionnaire was administered in 39 schools in the Southern area of the Health Service Executive, Ireland. Of the 4,583 adolescents aged 15-17 years who were invited to participate in the survey, 3,881 adolescents took part (response: 85%). RESULTS: A lifetime history of DSH was reported by 9.1% (n = 333) of the adolescents. DSH was more common among females (13.9%) than males (4.3%). Self cutting (66.0%) and overdose (35.2%) were the most common DSH methods. A minority of participants accessed medical services after engaging in DSH (15.3%). CONCLUSION: DSH is a significant problem in Irish adolescents and the vast majority do not come to the attention of health services. Innovative solutions for prevention and intervention are required to tackle DSH in adolescents.

  2. The influence of deliberate practice on musical achievement: a meta-analysis.

    Science.gov (United States)

    Platz, Friedrich; Kopiez, Reinhard; Lehmann, Andreas C; Wolf, Anna

    2014-01-01

    Deliberate practice (DP) is a task-specific structured training activity that plays a key role in understanding skill acquisition and explaining individual differences in expert performance. Relevant activities that qualify as DP have to be identified in every domain. For example, for training in classical music, solitary practice is a typical training activity during skill acquisition. To date, no meta-analysis on the quantifiable effect size of deliberate practice on attained performance in music has been conducted. Yet the identification of a quantifiable effect size could be relevant for the current discussion on the role of various factors on individual difference in musical achievement. Furthermore, a research synthesis might enable new computational approaches to musical development. Here we present the first meta-analysis on the role of deliberate practice in the domain of musical performance. A final sample size of 13 studies (total N = 788) was carefully extracted to satisfy the following criteria: reported durations of task-specific accumulated practice as predictor variables and objectively assessed musical achievement as the target variable. We identified an aggregated effect size of r c = 0.61; 95% CI [0.54, 0.67] for the relationship between task-relevant practice (which by definition includes DP) and musical achievement. Our results corroborate the central role of long-term (deliberate) practice for explaining expert performance in music.

  3. Informal and Deliberate Learning with New Technologies

    Science.gov (United States)

    Trinder, Ruth

    2017-01-01

    Due to the ready availability of new technologies, opportunities for the incidental as well as deliberate practice of English have multiplied and far exceed what can be done in more formal environments. Yet, despite the sizeable literature on the classroom-based use of specific digital resources, few studies have investigated how students evaluate…

  4. Associations between number of consecutive night shifts and impairment of neurobehavioral performance during a subsequent simulated night shift.

    Science.gov (United States)

    Magee, Michelle; Sletten, Tracey L; Ferguson, Sally A; Grunstein, Ronald R; Anderson, Clare; Kennaway, David J; Lockley, Steven W; Rajaratnam, Shantha Mw

    2016-05-01

    This study aimed to investigate sleep and circadian phase in the relationships between neurobehavioral performance and the number of consecutive shifts worked. Thirty-four shift workers [20 men, mean age 31.8 (SD 10.9) years] worked 2-7 consecutive night shifts immediately prior to a laboratory-based, simulated night shift. For 7 days prior, participants worked their usual shift sequence, and sleep was assessed with logs and actigraphy. Participants completed a 10-minute auditory psychomotor vigilance task (PVT) at the start (~21:00 hours) and end (~07:00 hours) of the simulated night shift. Mean reaction times (RT), number of lapses and RT distribution was compared between those who worked 2-3 consecutive night shifts versus those who worked 4-7 shifts. Following 4-7 shifts, night shift workers had significantly longer mean RT at the start and end of shift, compared to those who worked 2-3 shifts. The slowest and fastest 10% RT were significantly slower at the start, but not end, of shift among participants who worked 4-7 nights. Those working 4-7 nights also demonstrated a broader RT distribution at the start and end of shift and had significantly slower RT based on cumulative distribution analysis (5 (th), 25 (th), 50 (th), 75 (th)percentiles at the start of shift; 75th percentile at the end of shift). No group differences in sleep parameters were found for 7 days and 24 hours prior to the simulated night shift. A greater number of consecutive night shifts has a negative impact on neurobehavioral performance, likely due to cognitive slowing.

  5. AHP 47: A NIGHT DATE

    Directory of Open Access Journals (Sweden)

    Phun tshogs dbang rgyal ཕུན་ཚོགས་དབང་རྒྱལ།

    2017-04-01

    Full Text Available The author was born in 1993 in Ska chung (Gaqun Village, Nyin mtha' (Ningmute Township, Rma lho (Henan Mongolian Autonomous County, Rma lho (Huangnan Tibetan Autonomous Prefecture, Mtsho sngon (Qinghai Province, PR China. Night dating was popular for teenage boys some years ago. They rode horses and yaks when they went night dating. They generally rode yaks, because horses were important for their families and used for such important tasks as pursuing bandits and going to the county town for grain and supplies. An early experience with night dating is described.

  6. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  7. John porter lecture: waves of protest--direct action, deliberation, and diffusion.

    Science.gov (United States)

    Wood, Lesley

    2015-02-01

    The book Direct Action, Deliberation and Diffusion: Collective Action After the WTO Protests in Seattle argues that the process of diffusion is dependent on social processes in the receiving context. The most important in social movements is an egalitarian and reflexive deliberation among diverse actors. The book traces the direct action tactics associated with the Seattle protests against the World Trade Organization in 1999 and how these spread to activists in Toronto and New York City. It shows how the structure of the political field, racial and class inequalities, identity boundaries, and organizational and conversational dynamics limited deliberation among activists, and thus limited the diffusion of the Seattle tactics. By constraining the spread of the Seattle tactics, this slowed the global justice movement's wave of protest. In this paper, I explore the application of and implications of this model of protest tactic diffusion to the recent Idle No More mobilizations. © 2015 Canadian Sociological Association/La Société canadienne de sociologie.

  8. Dynamic Analysis of the Evolution of Cereus peruvianus (Cactaceae Areas Attacked by Phoma sp.

    Directory of Open Access Journals (Sweden)

    Gyorgy FESZT

    2009-12-01

    Full Text Available Cereus Peruvianus (night blooming Cereus, or peruvian apple is one of the sensitive species to Phoma attack. Photographic images can intercept a certain phytopathology, at a certain moment. The computerized analysis of such an image turns into a value the spread which the phytopathological process has at that moment. The purpose of this study is to assimilate the technique of achieving successions of digital photos of Cereus peruvianus f. monstruosa attacked by Phoma sp. Parallely with recording the images, with the help of Rhythm digital temperature humidity controller, were recorded data about the green house microclimate (air humidity-minimum and maximum, temperature-minimum and maximum. In the first stage of the study, the attack presents small fluctuations, reaching a high level in days with low temperatures. So, the most significant growths were recorded in the periods: 10. 02. 2005-20. 02. 2005 with an affected area of 10.97-8.82 = 2.15 and 11. 03. 2005-22. 04. 2005 with growth differences of 14.67-13.32 = 1.35. Generally, the affected areas grow in days with low minimum temperatures. The great advantage of this technique is represented by the possibility of using in situ in home areas of species or crop plants in fields. Repeated images, achieved in time, then overlapped, can provide important data on the evolution of affected areas.

  9. [Moral case deliberation: time for ethical reflection in the daily practice of mental health care].

    Science.gov (United States)

    Vellinga, A; van Melle-Baaijens, E A H

    2016-01-01

    Nowadays, reflecting on ethics, which we choose to call moral case deliberation, is occurring more and more frequently in psychiatric institutions. We have personal experience of organising and supervising moral case deliberation in a large psychiatric institute and we can confirm the positive effects of moral case deliberation which have been reported in the literature. To describe a structured method for moral case deliberation which enables care-givers in health care and/or addiction care to reflect on moral dilemmas. We refer to the main findings in relevant literature and describe how we developed a structured method for implementing moral case deliberation. Our studies of the literature indicate that systematic reflection about ethical dilemmas can improve the quality of care and make care-givers more satisfied with their work. This is why we have developed our own method which is applicable particularly to psychiatric and/or addition care and which can be used systematically in discussions of moral dilemmas. Our method for discussing ethical issues works well in clinical practice, particularly when it is embedded in a multidisciplinary context. Of course, to ensure the continuity of the system, deliberation about moral and ethical issues needs to be financially safeguarded and embedded in the organisation. Discussion of moral issues improves the quality of care and increases care-givers' satisfaction with their work.

  10. Place and Situated Deliberation in Participatory Planning – A Research Proposal

    DEFF Research Database (Denmark)

    Korn, Matthias

    2011-01-01

    for everyone and everywhere through a mobile augmented reality application that visualizes future, planned buildings on capable mobile phones. I conclude with the central questions and problems for future research that focuses on place and situated deliberation.......Within the domain of participatory urban planning, this position paper argues for a focus on the notion of place in the design of mobile and/or ubiquitous systems that are used in deliberation processes with central spatial references. I discuss (1) leveraging properties of place as a resource...

  11. Discover POPSCIENCE on Researchers' Night

    CERN Multimedia

    The POPSCIENCE Team

    2014-01-01

    On Friday 26 September 2014, CERN will be celebrating European Researchers' Night at three venues in Geneva and St. Genis-Pouilly. Inspired by Andy Warhol, this year's theme is “Pop science is for everyone”.     Every year, on the last Friday of September, the European Researchers’ Night takes place in about 300 cities all over Europe, with funding from the EU, to promote research and highlight researchers in engaging and fun ways for the general public. Andy Warhol said, “Pop art is for everyone”. This year, “Pop science is for everyone” is the motto of the Researchers’ Night event organised by CERN and its partners*. The night will offer everyone the opportunity to learn about the latest discoveries in physics and cosmology through poetry, theatre and music. This will be in addition to the event's traditional activities for the general public. To attract new audiences,...

  12. Doctor coach: a deliberate practice approach to teaching and learning clinical skills.

    Science.gov (United States)

    Gifford, Kimberly A; Fall, Leslie H

    2014-02-01

    The rapidly evolving medical education landscape requires restructuring the approach to teaching and learning across the continuum of medical education. The deliberate practice strategies used to coach learners in disciplines beyond medicine can also be used to train medical learners. However, these deliberate practice strategies are not explicitly taught in most medical schools or residencies. The authors designed the Doctor Coach framework and competencies in 2007-2008 to serve as the foundation for new faculty development and resident-as-teacher programs. In addition to teaching deliberate practice strategies, the programs model a deliberate practice approach that promotes the continuous integration of newly developed coaching competencies by participants into their daily teaching practice. Early evaluation demonstrated the feasibility and efficacy of implementing the Doctor Coach framework across the continuum of medical education. Additionally, the Doctor Coach framework has been disseminated through national workshops, which have resulted in additional institutions applying the framework and competencies to develop their own coaching programs. Design of a multisource evaluation tool based on the coaching competencies will enable more rigorous study of the Doctor Coach framework and training programs and provide a richer feedback mechanism for participants. The framework will also facilitate the faculty development needed to implement the milestones and entrustable professional activities in medical education.

  13. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Traffic Light Detection at Night

    DEFF Research Database (Denmark)

    Jensen, Morten Bornø; Philipsen, Mark Philip; Bahnsen, Chris

    2015-01-01

    Traffic light recognition (TLR) is an integral part of any in- telligent vehicle, it must function both at day and at night. However, the majority of TLR research is focused on day-time scenarios. In this paper we will focus on detection of traffic lights at night and evalu- ate the performance...... of three detectors based on heuristic models and one learning-based detector. Evaluation is done on night-time data from the public LISA Traffic Light Dataset. The learning-based detector out- performs the model-based detectors in both precision and recall. The learning-based detector achieves an average...

  15. Deliberative Democracy, Critical Thinking, and the Deliberating Individual: empirical challenges to the reasonability of the citizen

    Directory of Open Access Journals (Sweden)

    Juho Ritola

    2015-01-01

    Full Text Available In this essay, I first discuss the conditions set by theorists of democratic deliberation on proper deliberation. These conditions call for reasoned decisions from mutually acceptable premises. Next, I present the ideal of critical thinking that should guide the citizen in this deliberation. I then examine the empirical literature on human reasoning. Some research results in the empirical literature paint a bleak picture of human rationality: we fall victim to heuristics and biases, persevere in our beliefs in the face of contrary evidence, and justify our moral judgments by post hoc-reasoning. In addition, the deliberating groups have problems of their own. The groups may, for example, amplify errors or fall victim to information cascades.  Though these epistemically detrimental processes can be overcome, they do present a challenge to our rationality. The essay concludes by arguing that the empirical evidence in fact supports an internalistic approach to group deliberation, a claim challenged by Solomon (2006.

  16. Vaginismus and dyspareunia: automatic vs. deliberate disgust responsivity.

    Science.gov (United States)

    Borg, Charmaine; de Jong, Peter J; Schultz, Willibrord Weijmar

    2010-06-01

    The difficulty of penetration experienced in vaginismus and dyspareunia may at least partly be due to a disgust-induced defensive response. To examine if sex stimuli specifically elicit: (i) automatic disgust-related memory associations; (ii) physiological disgust responsivity; and/or (iii) deliberate expression of disgust/threat. Two single target Implicit Association Task (st-IAT) and electromyography (EMG) were conducted on three groups: vaginismus (N = 24), dyspareunia (N = 24), and control (N = 31) group. st-IAT, to index their initial disgust-related associations and facial EMG for the m. levator labii and m. corrugator supercilii regions. Both clinical groups showed enhanced automatic sex-disgust associations. As a unique physiological expression of disgust, the levator activity was specifically enhanced for the vaginismus group, when exposed to a women-friendly SEX video clip. Also at the deliberate level, specifically the vaginismus group showed enhanced subjective disgust toward SEX pictures and the SEX clip, along with higher threat responses. Supporting the view that disgust is involved in vaginismus and dyspareunia, for both, clinical groups' sex stimuli automatically elicited associations with disgust. Particularly for the vaginismus group, these initial disgust associations persisted during subsequent validation processes and were also evident at the level of facial expression and self-report data. Findings are consistent with the notion that uncontrollable activated associations are involved in eliciting defensive reactions at the prospect of penetration seen in both conditions. Whereas deliberate attitudes, usually linked with the desire for having intercourse, possibly generate the distinction (e.g., severity) between these two conditions.

  17. Governance networks as a frame for inter-demoi participation and deliberation

    DEFF Research Database (Denmark)

    Sørensen, Eva

    2012-01-01

    By focusing exclusively on the contributions of political participation and deliberation to the enhancement of democratic regulation within a unitary democratic unit-that is, a demos-traditional liberal theories of democracy overlook the democratic value of political participation and deliberation...... between demoi. The need to find ways to increase the democratic quality of inter-demoi interaction is growing rapidly due to the emergence of a pluricentric political system in which cross-demoi decision-making is more the rule than the exception. There is an urgent call for new theories of democracy able...

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. Volunteers for Researchers’ Night wanted

    CERN Multimedia

    Katarina Anthony

    2015-01-01

    Every year, on the last Friday of September, the European Researchers’ Night (see here) takes place in about 300 cities all over Europe - promoting research in engaging and fun ways for the general public. This year, CERN will be participating once again, hosting dozens of events across the Balexert shopping centre – and we’ll need YOUR help to make the celebration a success.   From film screenings and celebrity Q&A sessions to “Ask a Researcher” and build-your-own LEGO LHC events, this year’s Researchers’ Night is going to be jam-packed! The fun will kick off prior to the night itself with a mock-up of the LHC tunnel installed in the central court of the Balexert shopping centre, 8-12 September*. CERN people will be on hand to speak to shoppers about the LHC, and to encourage them to participate in Researchers’ Night! The CERN organisers are recruiting volunteers and support staff for Researchers’ ...

  20. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  1. 5 CFR 532.505 - Night shift differentials.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Night shift differentials. 532.505... PREVAILING RATE SYSTEMS Premium Pay and Differentials § 532.505 Night shift differentials. (a) Employees shall be entitled to receive night shift differentials in accordance with section 5343 of title 5...

  2. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  3. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  4. Night airglow in RGB mode

    Directory of Open Access Journals (Sweden)

    Mikhalev А.V.

    2016-09-01

    Full Text Available To study dynamics of the upper atmosphere, we consider results of the night sky photometry, using a color CCD camera and taking into account the night airglow and features of its spectral composition. We use night airglow observations for 2010–2015, which have been obtained at the ISTP SB RAS Geophysical Observatory (52° N, 103° E by the camera with KODAK KAI-11002 CCD sensor. We estimate average brightness of the night sky in R, G, B channels of the color camera for eastern Siberia with typical values ranging from ~0.008 to 0.01 erg·cm–2·s–1. Besides, we determine seasonal variations in the night sky luminosities in R, G, B channels of the color camera. In these channels, luminosities decrease in spring, increase in autumn, and have a pronounced summer maximum, which can be explained by scattered light and is associated with the location of the Geophysical Observatory. We consider geophysical phenomena with their optical effects in R, G, B channels of the color camera. For some geophysical phenomena (geomagnetic storms, sudden stratospheric warmings, we demonstrate the possibility of quantitative relationship between enhanced signals in R and G channels and increases in intensities of discrete 557.7 and 630 nm emissions, which are predominant in the airglow spectrum

  5. The control of deliberate waiting strategies in a stop-signal task

    Directory of Open Access Journals (Sweden)

    R.P. Sylwan

    2004-06-01

    Full Text Available To inhibit an ongoing flow of thoughts or actions has been largely considered to be a crucial executive function, and the stop-signal paradigm makes inhibitory control measurable. Stop-signal tasks usually combine two concurrent tasks, i.e., manual responses to a primary task (go-task are occasionally countermanded by a stimulus which signals participants to inhibit their response in that trial (stop-task. Participants are always instructed not to wait for the stop-signal, since waiting strategies cause the response times to be unstable, invalidating the data. The aim of the present study was to experimentally control the strategies of waiting deliberately for the stop-signal in a stop-task by means of an algorithm that measured the variation in the reaction times to go-stimuli on-line, and displayed a warning legend urging participants to be faster when their reaction times were more than two standard deviations of the mean. Thirty-four university students performed a stop-task with go- and stop-stimuli, both of which were delivered in the visual modality and were lateralized within the visual field. The participants were divided into two groups (group A, without the algorithm, vs group B, with the algorithm. Group B exhibited lower variability of reaction times to go-stimuli, whereas no significant between-group differences were found in any of the measures of inhibitory control, showing that the algorithm succeeded in controlling the deliberate waiting strategies. Differences between deliberate and unintentional waiting strategies, and anxiety as a probable factor responsible for individual differences in deliberate waiting behavior, are discussed.

  6. Public deliberation in municipal planning

    DEFF Research Database (Denmark)

    Bohøj, Morten; Borchorst, Nikolaj Gandrup; Bødker, Susanne

    2011-01-01

    This paper reports on an exploratory participatory design process aimed at supporting citizen deliberation in municipal planning. It presents the main outcomes of this process in terms of selected prototypes and an approach to the use setting. We support and discuss different ways for citizens...... to act and reflect on proposed plans: in-situ, while physically close to the planning object, and ex-situ, when citizens are remote from this. The support of in-situ and ex-situ participation allows citizens to engage in continuous reflection-in and on-action as a collaborative activity with other...

  7. Engaging Youth and Pre-Service Teachers in Immigration Deliberations

    Science.gov (United States)

    Daniel, Shannon M.

    2015-01-01

    In this report of innovative teacher practice, the author describes an arts-based event which brought together adolescent refugee and immigrant students and pre-service teachers to deliberate about immigration policies and attitudes in the United States.

  8. Assessing the associations among trait and state levels of deliberate and spontaneous mind wandering.

    Science.gov (United States)

    Seli, Paul; Risko, Evan F; Smilek, Daniel

    2016-04-01

    Recent research has demonstrated that mind wandering can be subdivided into spontaneous and deliberate types, and this distinction has been found to hold at both the trait and state levels. However, to date, no attempts have been made to link trait-level spontaneous and deliberate mind wandering with state-level assessments of these two subtypes of mind wandering. Here we evaluated whether trait-level deliberate and spontaneous mind wandering map onto state levels of these subtypes of mind wandering. Results showed correspondence between trait-level reports of spontaneous and deliberate mind wandering and their state-level counterparts, indicating that people's reports on the intentionality of their mind wandering in the laboratory correspond to their reports of the intentionality of mind wandering in everyday life. Thus, the trait- and state-level scales of mind wandering were found to validate each other: Whereas the state-level measures provided some construct validity for the trait-level measures, the trait-level measures indicated that the state-level measures may be generalizable to everyday situations. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Menstrual characteristics and night work among nurses.

    Science.gov (United States)

    Moen, Bente E; Baste, Valborg; Morken, Tone; Alsaker, Kjersti; Pallesen, Ståle; Bjorvatn, Bjørn

    2015-01-01

    Night work has been associated with adverse effects in terms of reproductive health. Specifically, menstruation has been suggested to be negatively impacted by night work, which again may influence fertility. This study investigated whether working nights is related to menstrual characteristics and if there is a relationship between shift work disorder (SWD) and menstruation. The study was cross-sectional, response rate 38%. The sample comprised female nurses who were members of the Norwegian Nurses Association; below 50 yr of age, who were not pregnant, did not use hormonal pills or intrauterine devices and who had not reached menopause (n=766). The nurses answered a postal survey including questions about night work and menstrual characteristics. Fifteen per cent reported to have irregular menstruations. Thirty-nine per cent of the nurses were classified as having SWD. Logistic regression analyses concerning the relationship between irregular menstruations and night work did not show any associations. Furthermore, no associations were found between cycle length or bleeding period and night work parameters. No associations were found between menstrual characteristics and SWD.

  11. Hot Flashes amd Night Sweats (PDQ)

    Science.gov (United States)

    ... Professionals Questions to Ask about Your Treatment Research Hot Flashes and Night Sweats (PDQ®)–Patient Version Overview ... quality of life in many patients with cancer. Hot flashes and night sweats may be side effects ...

  12. The night sky brightness at McDonald Observatory

    Science.gov (United States)

    Kalinowski, J. K.; Roosen, R. G.; Brandt, J. C.

    1975-01-01

    Baseline observations of the night sky brightness in B and V are presented for McDonald Observatory. In agreement with earlier work by Elvey and Rudnick (1937) and Elvey (1943), significant night-to-night and same-night variations in sky brightness are found. Possible causes for these variations are discussed. The largest variation in sky brightness found during a single night is approximately a factor of two, a value which corresponds to a factor-of-four variation in airglow brightness. The data are used to comment on the accuracy of previously published surface photometry of M 81.

  13. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  14. Comparing group deliberation to other forms of preference aggregation in valuing ecosystem services

    Directory of Open Access Journals (Sweden)

    Mackenzie B. Murphy

    2017-12-01

    Full Text Available Deliberative methods for valuing ecosystem services are hypothesized to yield group preferences that differ systematically from those that would be obtained through calculative aggregation of the preferences of participating individuals. We tested this hypothesis by comparing the group consensus results of structured deliberations against a variety of aggregation methods applied to individual participant preferences that were elicited both before and after the deliberations. Participants were also asked about their perceptions of the deliberative process, which we used to assess their ability to detect preference changes and identify the causes of any changes. For five of the seven groups tested, the group consensus results could not have been predicted from individual predeliberation preferences using any of the aggregation rules. However, individual postdeliberation preferences could be used to reconstruct the group preferences using consensual and rank-based aggregation rules. These results imply that the preferences of participants changed over the course of the deliberation and that the group preferences reflected a broad consensus on overall rankings rather than simply the pairwise preferences of the majority. Changes in individual preferences seem to have gone largely unnoticed by participants, as most stated that they did not believe their preferences had substantially changed. Most participants were satisfied with the outcome of the deliberation, and their degree of satisfaction was correlated with the feeling that their opinion was heard and that they had an influence on the outcome. Based on our results, group deliberation shows promise as a means of generating ecosystem service valuations that reflect a consensus opinion rather than simply a collection of personal preferences.

  15. Don't just do something, stand there! The value and art of deliberate clinical inertia.

    Science.gov (United States)

    Keijzers, Gerben; Cullen, Louise; Egerton-Warburton, Diana; Fatovich, Daniel M

    2018-04-01

    It can be difficult to avoid unnecessary investigations and treatments, which are a form of low-value care. Yet every intervention in medicine has potential harms, which may outweigh the potential benefits. Deliberate clinical inertia is the art of doing nothing as a positive response. This paper provides suggestions on how to incorporate deliberate clinical inertia into our daily clinical practice, and gives an overview of current initiatives such as 'Choosing Wisely' and the 'Right Care Alliance'. The decision to 'do nothing' can be complex due to competing factors, and barriers to implementation are highlighted. Several strategies to promote deliberate clinical inertia are outlined, with an emphasis on shared decision-making. Preventing medical harm must become one of the pillars of modern health care and the art of not intervening, that is, deliberate clinical inertia, can be a novel patient-centred quality indicator to promote harm reduction. © 2018 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  16. Teaching ethics in the clinic. The theory and practice of moral case deliberation.

    Science.gov (United States)

    Molewijk, A C; Abma, T; Stolper, M; Widdershoven, G

    2008-02-01

    A traditional approach to teaching medical ethics aims to provide knowledge about ethics. This is in line with an epistemological view on ethics in which moral expertise is assumed to be located in theoretical knowledge and not in the moral experience of healthcare professionals. The aim of this paper is to present an alternative, contextual approach to teaching ethics, which is grounded in a pragmatic-hermeneutical and dialogical ethics. This approach is called moral case deliberation. Within moral case deliberation, healthcare professionals bring in their actual moral questions during a structured dialogue. The ethicist facilitates the learning process by using various conversation methods in order to find answers to the case and to develop moral competencies. The case deliberations are not unique events, but are a structural part of the professional training on the work floor within healthcare institutions. This article presents the underlying theory on (teaching) ethics and illustrates this approach with an example of a moral case deliberation project in a Dutch psychiatric hospital. The project was evaluated using the method of responsive evaluation. This method provided us with rich information about the implementation process and effects the research process itself also lent support to the process of implementation.

  17. Simulation-Based Mastery Learning with Deliberate Practice Improves Clinical Performance in Spinal Anesthesia

    Directory of Open Access Journals (Sweden)

    Ankeet D. Udani

    2014-01-01

    Full Text Available Introduction. Properly performing a subarachnoid block (SAB is a competency expected of anesthesiology residents. We aimed to determine if adding simulation-based deliberate practice to a base curriculum improved performance of a SAB. Methods. 21 anesthesia residents were enrolled. After baseline assessment of SAB on a task-trainer, all residents participated in a base curriculum. Residents were then randomized so that half received additional deliberate practice including repetition and expert-guided, real-time feedback. All residents were then retested for technique. SABs on all residents’ next three patients were evaluated in the operating room (OR. Results. Before completing the base curriculum, the control group completed 81% of a 16-item performance checklist on the task-trainer and this increased to 91% after finishing the base curriculum (P<0.02. The intervention group also increased the percentage of checklist tasks properly completed from 73% to 98%, which was a greater increase than observed in the control group (P<0.03. The OR time required to perform SAB was not different between groups. Conclusions. The base curriculum significantly improved resident SAB performance. Deliberate practice training added a significant, independent, incremental benefit. The clinical impact of the deliberate practice intervention in the OR on patient care is unclear.

  18. Simulation-based mastery learning with deliberate practice improves clinical performance in spinal anesthesia.

    Science.gov (United States)

    Udani, Ankeet D; Macario, Alex; Nandagopal, Kiruthiga; Tanaka, Maria A; Tanaka, Pedro P

    2014-01-01

    Introduction. Properly performing a subarachnoid block (SAB) is a competency expected of anesthesiology residents. We aimed to determine if adding simulation-based deliberate practice to a base curriculum improved performance of a SAB. Methods. 21 anesthesia residents were enrolled. After baseline assessment of SAB on a task-trainer, all residents participated in a base curriculum. Residents were then randomized so that half received additional deliberate practice including repetition and expert-guided, real-time feedback. All residents were then retested for technique. SABs on all residents' next three patients were evaluated in the operating room (OR). Results. Before completing the base curriculum, the control group completed 81% of a 16-item performance checklist on the task-trainer and this increased to 91% after finishing the base curriculum (P < 0.02). The intervention group also increased the percentage of checklist tasks properly completed from 73% to 98%, which was a greater increase than observed in the control group (P < 0.03). The OR time required to perform SAB was not different between groups. Conclusions. The base curriculum significantly improved resident SAB performance. Deliberate practice training added a significant, independent, incremental benefit. The clinical impact of the deliberate practice intervention in the OR on patient care is unclear.

  19. Dewey's Theory of Moral (and Political) Deliberation Unfiltered

    Science.gov (United States)

    Ralston, Shane J.

    2010-01-01

    In this paper, I argue that many recent interpretations of John Dewey's vision of democracy distort that vision by filtering it through the prism of contemporary deliberative democratic theories. An earlier attempt to defend Dewey's theory of moral deliberation is instructive for understanding the nature and function of this filter. In James…

  20. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  1. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  2. Dark nights reverse metabolic disruption caused by dim light at night.

    Science.gov (United States)

    Fonken, L K; Weil, Z M; Nelson, R J

    2013-06-01

    The increasing prevalence of obesity and related metabolic disorders coincides with increasing exposure to light at night. Previous studies report that mice exposed to dim light at night (dLAN) develop symptoms of metabolic syndrome. This study investigated whether mice returned to dark nights after dLAN exposure recover metabolic function. Male Swiss-Webster mice were assigned to either: standard light-dark (LD) conditions for 8 weeks (LD/LD), dLAN for 8 weeks (dLAN/dLAN), LD for 4 weeks followed by 4 weeks of dLAN (LD/dLAN), and dLAN for 4 weeks followed by 4 weeks of LD (dLAN/LD). After 4 weeks in their respective lighting conditions both groups initially placed in dLAN increased body mass gain compared to LD mice. Half of the dLAN mice (dLAN/LD) were then transferred to LD and vice versa (LD/dLAN). Following the transfer dLAN/dLAN and LD/dLAN mice gained more weight than LD/LD and dLAN/LD mice. At the conclusion of the study dLAN/LD mice did not differ from LD/LD mice with respect to weight gain and had lower fat pad mass compared to dLAN/dLAN mice. Compared to all other groups dLAN/dLAN mice decreased glucose tolerance as indicated by an intraperitoneal glucose tolerance test at week 7, indicating that dLAN/LD mice recovered glucose metabolism. dLAN/dLAN mice also increased MAC1 mRNA expression in peripheral fat as compared to both LD/LD and dLAN/LD mice, suggesting peripheral inflammation is induced by dLAN, but not sustained after return to LD. These results suggest that re-exposure to dark nights ameliorates metabolic disruption caused by dLAN exposure. Copyright © 2013 The Obesity Society.

  3. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. The impact of short night-time naps on performance, sleepiness and mood during a simulated night shift.

    Science.gov (United States)

    Centofanti, Stephanie A; Hilditch, Cassie J; Dorrian, Jillian; Banks, Siobhan

    2016-01-01

    Short naps on night shift are recommended in some industries. There is a paucity of evidence to verify the sustained recovery benefits of short naps in the last few hours of the night shift. Therefore, the current study aimed to investigate the sustained recovery benefits of 30 and 10-min nap opportunities during a simulated night shift. Thirty-one healthy participants (18F, 21-35 y) completed a 3-day, between-groups laboratory study with one baseline night (22:00-07:00 h time in bed), followed by one night awake (time awake from 07:00 h on day two through 10:00 h day three) with random allocation to: a 10-min nap opportunity ending at 04:00 h, a 30-min nap opportunity ending at 04:00 h or no nap (control). A neurobehavioral test bout was administered approximately every 2 h during wake periods. There were no significant differences between nap conditions for post-nap psychomotor vigilance performance after controlling for pre-nap scores (p > 0.05). The 30-min nap significantly improved subjective sleepiness compared to the 10-min nap and no-nap control (p effect.

  6. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  7. Tax Salience, Voting, and Deliberation

    DEFF Research Database (Denmark)

    Sausgruber, Rupert; Tyran, Jean-Robert

    Tax incentives can be more or less salient, i.e. noticeable or cognitively easy to process. Our hypothesis is that taxes on consumers are more salient to consumers than equivalent taxes on sellers because consumers underestimate the extent of tax shifting in the market. We show that tax salience...... biases consumers' voting on tax regimes, and that experience is an effective de-biasing mechanism in the experimental laboratory. Pre-vote deliberation makes initially held opinions more extreme rather than correct and does not eliminate the bias in the typical committee. Yet, if voters can discuss...... their experience with the tax regimes they are less likely to be biased....

  8. Online Public Deliberation in China

    DEFF Research Database (Denmark)

    Medaglia, Rony; Yang, Yang

    2017-01-01

    Internet discussion platforms in China provide a hugely interesting and relevant source for understanding dynamics of online discussions in a unique context. Adopting the theoretical lens of public deliberation, this paper investigates the evolution of patterns of similar-minded and different......-minded interactions over time on a Chinese online discussion forum. We analyse the content and reply networks of 18,000+ messages on four highly debated topics on the Bulletin Board System (BBS) platform Tianya. Findings provide nuanced evidence to the phenomenon of increased network homophily over time, mitigated...... investigation on independent variables for understanding dynamics of online discussions, and for studies comparing cases across different contexts....

  9. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  10. Longitudinal relationships between gratitude, deliberate rumination, and posttraumatic growth in adolescents following the Wenchuan earthquake in China.

    Science.gov (United States)

    Zhou, Xiao; Wu, Xinchun

    2015-10-01

    To examine the longitudinal relationship between gratitude, deliberate rumination and posttraumatic growth (PTG) in the adolescent survivors after the Wenchuan earthquake, 217 adolescent survivors were randomly selected from several primary and secondary schools in the county of Wenchuan, and were assessed by questionnaires at three and a half years (T1), four and a half years (T2), five and a half years (T3) after the Wenchuan earthquake, respectively. The results found that there was a one-way predictive relationship of gratitude onto PTG from T1 to T3, and gratitude predicted deliberate rumination from T1 to T2 but not T2 to T3. Deliberate rumination only had a significant positive effect on PTG from T2 to T3, and PTG only predicted deliberate rumination from T1 to T2. These results indicated that gratitude could be a stable predictive factor for the development of PTG, and gratitude could also affect PTG by deliberate rumination. In addition, the predictive effect between deliberate rumination and PTG is unstable with time change. © 2015 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  11. What is the preferred number of consecutive night shifts?

    DEFF Research Database (Denmark)

    Nabe-Nielsen, Kirsten; Jensen, Marie Aarrebo; Hansen, Åse Marie

    2016-01-01

    % preferred '2 + 2' and 26% preferred '7 + 7'. Participants, who preferred longer spells of night work experienced that night work was less demanding, found it easier to sleep at different times of the day, and were more frequently evening types compared with participants who preferred shorter spells of night...... the longer spells of night work found night work less demanding, found it easier to sleep at different times of the day, and were more frequently evening types....

  12. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  13. Night Rover Challenge

    Data.gov (United States)

    National Aeronautics and Space Administration — The objective of the Night Rover Challenge was to foster innovations in energy storage technology. Specifically, this challenge asked competitors to create an energy...

  14. Night sky a falcon field guide

    CERN Document Server

    Nigro, Nicholas

    2012-01-01

    Night Sky: A Falcon Field Guide covers both summer and winter constellations, planets, and stars found in the northern hemisphere. Conveniently sized to fit in a pocket and featuring detailed photographs, this informative guide makes it easy to identify objects in the night sky even from one's own backyard. From information on optimal weather conditions, preferred viewing locations, and how to use key tools of the trade, this handbook will help you adeptly navigate to and fro the vast and dynamic nighttime skies, and you'll fast recognize that the night sky's the limit.

  15. Relationship between thyroid stimulating hormone and night shift work.

    Science.gov (United States)

    Moon, So-Hyun; Lee, Bum-Joon; Kim, Seong-Jin; Kim, Hwan-Cheol

    2016-01-01

    Night shift work has well-known adverse effects on health. However, few studies have investigated the relationship between thyroid diseases and night shift work. This study aimed to examine night shift workers and their changes in thyroid stimulating hormones (TSH) levels over time. Medical check-up data (2011-2015) were obtained from 967 female workers at a university hospital in Incheon, Korea. Data regarding TSH levels were extracted from the records, and 2015 was used as a reference point to determine night shift work status. The relationships between TSH levels and night shift work in each year were analyzed using the general linear model (GLM). The generalized estimating equation (GEE) was used to evaluate the repeated measurements over the 5-year period. The GEE analysis revealed that from 2011 to 2015, night shift workers had TSH levels that were 0.303 mIU/L higher than the levels of non-night shift workers (95 % CI: 0.087-0.519 mIU/L, p  = 0.006) after adjusting for age and department. When we used TSH levels of 4.5 ≥ mIU/L to identify subclinical hypothyroidism, night shift workers exhibited a 1.399 fold higher risk of subclinical hypothyroidism (95 % CI: 1.050-1.863, p  = 0.022), compared to their non-night shift counterparts. This result of this study suggests that night shift workers may have an increased risk of thyroid diseases, compared to non-night shift workers.

  16. Intuitive and Deliberate Judgments Are Based on Common Principles

    Science.gov (United States)

    Kruglanski, Arie W.; Gigerenzer, Gerd

    2011-01-01

    A popular distinction in cognitive and social psychology has been between "intuitive" and "deliberate" judgments. This juxtaposition has aligned in dual-process theories of reasoning associative, unconscious, effortless, heuristic, and suboptimal processes (assumed to foster intuitive judgments) versus rule-based, conscious, effortful, analytic,…

  17. The role of emotions in moral case deliberation: theory, practice, and methodology.

    Science.gov (United States)

    Molewijk, Bert; Kleinlugtenbelt, Dick; Widdershoven, Guy

    2011-09-01

    In clinical moral decision making, emotions often play an important role. However, many clinical ethicists are ignorant, suspicious or even critical of the role of emotions in making moral decisions and in reflecting on them. This raises practical and theoretical questions about the understanding and use of emotions in clinical ethics support services. This paper presents an Aristotelian view on emotions and describes its application in the practice of moral case deliberation. According to Aristotle, emotions are an original and integral part of (virtue) ethics. Emotions are an inherent part of our moral reasoning and being, and therefore they should be an inherent part of any moral deliberation. Based on Aristotle's view, we examine five specific aspects of emotions: the description of emotions, the attitude towards emotions, the thoughts present in emotions, the reliability of emotions, and the reasonable principle that guides an emotion. We then discuss three ways of dealing with emotions in the process of moral case deliberation. Finally, we present an Aristotelian conversation method, and present practical experiences using this method. © 2011 Blackwell Publishing Ltd.

  18. From Protest to Political Parties: Online Deliberation in New Parties in Spain

    Directory of Open Access Journals (Sweden)

    Rosa Borge Bravo

    2016-12-01

    Full Text Available The new parties that emerged following the 15-M movement and against the austerity measures in Spain want to build parties open to the participation and deliberation for all the citizenry. To what extent are these ideals being fulfilled? The aim of this article is to describe and assess some of the main online deliberative processes of the two most important parties, Podemos and Barcelona En Comú, following commonly accepted criteria in the literature for measuring online deliberation. Specifically, we have examined the two most-voted proposals from the online platform Plaza Podemos and the online development of the electoral programme of Barcelona En Comú. Thus, we have conducted a content analysis of 713 (Plaza Podemos and 563 (Barcelona En Comú posts. Both platforms meet the structural and technical criteria for fostering deliberation, but the external impact is high only in the case of Barcelona En Comú. The deliberative quality of the communication is good but not the criteria of reflexivity, inclusion and plurality.

  19. Aristotle’s contribution to the deliberation from a bioethical perspective

    Directory of Open Access Journals (Sweden)

    Mario Orlando Parra-Pineda

    2017-10-01

    Full Text Available Deliberation is a basic rational human activity recognized since ancient times due to its role in decision making during daily life activities and in specialized areas of knowledge such as medicine, politics and ethics. The objective of this reflection paper is to study the contribution of Aristotle to the deliberative process through his work the Nicomachean Ethics, where the following aspects of deliberation were identified for analysis: origin, definition, characteristics, and types and conditions for its development. Bioethics defend these aspects, since it finds in Aristotelian phronesis the fundamental axis to guide its actions in search of human self-realization and the analysis and decision making of the clinical bioethical problems. Twenty-four centuries have passed until the importance of this process and the need to educate about it was finally rediscovered.

  20. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  1. Night time cooling by ventilation or night sky radiation combined with in-room radiant cooling panels including phase change materials

    DEFF Research Database (Denmark)

    Bourdakis, Eleftherios; Olesen, Bjarne W.; Grossule, Fabio

    Night sky radiative cooling technology using PhotoVoltaic/Thermal panels (PVT) and night time ventilation have been studied both by means of simulations and experiments to evaluate their potential and to validate the created simulation model used to describe it. An experimental setup has been...... depending on the sky clearness. This cooling power was enough to remove the stored heat and regenerate the ceiling panels. The validation simulation model results related to PCM were close to the corresponding results extracted from the experiment, while the results related to the production of cold water...... through the night sky radiative cooling differed significantly. The possibility of night time ventilation was studied through simulations for three different latitudes. It was concluded that for Danish climatic conditions night time ventilation would also be able to regenerate the panels while its...

  2. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  3. In search of online deliberation : Towards a new method for examining the quality of online discussions

    NARCIS (Netherlands)

    Graham, Todd; Witschge, Tamara

    2003-01-01

    Many advocates of deliberative democracy see in the Internet a new opportunity for the development of public spaces, public spheres, and places where deliberation can take place. An important element of the notion of the public sphere in general and of deliberation specifically, is the quality of

  4. Examining the scope and patterns of deliberate self-injurious cutting content in popular social media.

    Science.gov (United States)

    Miguel, Elizabeth M; Chou, Tommy; Golik, Alejandra; Cornacchio, Danielle; Sanchez, Amanda L; DeSerisy, Mariah; Comer, Jonathan S

    2017-09-01

    Social networking services (SNS) have rapidly become a central platform for adolescents' social interactions and media consumption patterns. The present study examined a representative sample of publicly accessible content related to deliberate self-injurious cutting across three SNS platforms: Twitter, Tumblr, and Instagram. Data collection simulated searches for publicly available deliberate self-injury content on Twitter, Tumblr, and Instagram. Over a six-month period at randomly generated time points, data were obtained by searching "#cutting" on each SNS platform and collecting the first 10 posts generated. Independent evaluators coded posts for presence of the following: (a) graphic content, (b) negative self-evaluations, (c) references to mental health terms, (d) discouragement of deliberate self-injury, and (e) recovery-oriented resources. Differences across platforms were examined. Data collection yielded a sample of 1,155 public posts (770 of which were related to mental health). Roughly 60% of sampled posts depicted graphic content, almost half included negative self-evaluations, only 9.5% discouraged self-injury, and Instagram posts displayed the greatest proportion of graphic content and negative self-evaluations, whereas Twitter exhibited the smallest proportion of each. Findings characterize the graphic nature of online SNS deliberate self-injury content and the relative absence of SNS-posted resources for populations seeking out deliberate self-injurious cutting content. Mental health professionals must recognize the rapidly changing landscape of adolescent media consumption, influences, and social interaction as they may pertain to self-harm patterns. © 2017 Wiley Periodicals, Inc.

  5. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  6. [Shift and night work and mental health].

    Science.gov (United States)

    Sancini, Angela; Ciarrocca, Manuela; Capozzella, Assunta; Corbosiero, Paola; Fiaschetti, Maria; Caciari, Tiziana; Cetica, Carlotta; Scimitto, Lara; Ponticiello, Barnaba Giuseppina; Tasciotti, Zaira; Schifano, Maria Pia; Andreozzit, Giorgia; Tomei, Francesco; Tomei, Gianfranco

    2012-01-01

    Aim of our study was to evaluate the influence that shift work and night work could have on mental health. A review of literary articles from 1990 to 2011 on shift work and night work was carried out. The results of this review confirmed that the shift work and night work affect mental health with the onset of neuropsychological disorders such as mood disorders, anxiety, nervousness, depressive anxiety syndromes, chronic fatigue and chronic insomnia irritability, sleep disturbances, reduction in levels of attention, cognitive impairments, alteration of circadian rhythm. Night work and shift work cause severe desynchronization of the cronobiological rhythms and a disruption of social life with negative effects on performance at work, on health and on social relationships. In the light of these results and recognizing shift work and night work as risk factors for the health of workers is necessary to implement preventive and periodic health checks by the occupational doctor to ensure the health and safety of workers taking account of the different environmental and individual factors.

  7. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  9. Deliberate Learning and Vocabulary Acquisition in a Second Language

    Science.gov (United States)

    Elgort, Irina

    2011-01-01

    This study investigates outcomes of deliberate learning on vocabulary acquisition in a second language (L2). Acquisition of 48 pseudowords was measured using the lexical decision task with visually presented stimuli. The experiments drew on form priming, masked repetition priming, and automatic semantic priming procedures. Data analyses revealed a…

  10. NIGHT SKY BRIGHTNESS ABOVE ZAGREB 2012.-2017.

    Directory of Open Access Journals (Sweden)

    Željko Andreić

    2018-01-01

    Full Text Available The night sky brightness at the RGN site (near the centre of Zagreb, Croatia was monitored form January 2012. to December 2017. The gathered data show that the average night sky brightness in this period did not change significantly, apart from differences caused by yearly variations in meteorological parameters. The nightly minima, maxima and mean values of the sky brightness do change considerably due to changes in meteorological conditions, often being between 2 and 3 magnitudes. The seasonal probability curves and histograms are constructed and are used to obtain additional information on the light pollution at the RGN site. They reveal that the night sky brightness clutters around two peaks, at about 15.0 mag/arcsec2 and at about 18.2 mag/arcsec2. The tendency to slightly lower brightness values in spring and summer can also be seen in the data. Two peaks correspond to cloudy and clear nights respectively, the difference in brightness between them being about 3 magnitudes. A crude clear/cloudy criterion can be defined too: the minimum between two peaks is around 16.7 mag/arcsec2. The brightness values smaller than thisare attributed to clear nights and vice-versa. Comparison with Vienna and Hong-Kong indicates that the light pollution of Zagreb is a few times larger.

  11. Night shift decreases cognitive performance of ICU physicians.

    Science.gov (United States)

    Maltese, François; Adda, Mélanie; Bablon, Amandine; Hraeich, Sami; Guervilly, Christophe; Lehingue, Samuel; Wiramus, Sandrine; Leone, Marc; Martin, Claude; Vialet, Renaud; Thirion, Xavier; Roch, Antoine; Forel, Jean-Marie; Papazian, Laurent

    2016-03-01

    The relationship between tiredness and the risk of medical errors is now commonly accepted. The main objective of this study was to assess the impact of an intensive care unit (ICU) night shift on the cognitive performance of a group of intensivists. The influence of professional experience and the amount of sleep on cognitive performance was also investigated. A total of 51 intensivists from three ICUs (24 seniors and 27 residents) were included. The study participants were evaluated after a night of rest and after a night shift according to a randomized order. Four cognitive skills were tested according to the Wechsler Adult Intelligence Scale and the Wisconsin Card Sorting Test. All cognitive abilities worsened after a night shift: working memory capacity (11.3 ± 0.3 vs. 9.4 ± 0.3; p night shift. The cognitive abilities of intensivists were significantly altered following a night shift in the ICU, regardless of either the amount of professional experience or the duration of sleep during the shift. The consequences for patients' safety and physicians' health should be further evaluated.

  12. Deliberation at the hub of medical education: beyond virtue ethics and codes of practice.

    Science.gov (United States)

    Barilan, Y M; Brusa, M

    2013-02-01

    Although both codes of practice and virtue ethics are integral to the ethos and history of "medical professionalism", the two trends appear mutually incompatible. Hence, in the first part of the paper we explore and explicate this apparent conflict and seek a direction for medical education. The theoretical and empirical literature indicates that moral deliberation may transcend the incompatibilities between the formal and the virtuous, may enhance moral and other aspects of personal sensitivity, may help design and improve other parts of the curricula, and may foster self-awareness and clarification of the professional role. Not only are these goals essential for good and conscientious doctoring, but they may also reduce physicians' "burn-out". We argue that medical education should focus on the ubiquitous practice of deliberation in contemporary medicine, and especially the practice of moral deliberation.

  13. The city at night (the case of Maribor, Slovenia

    Directory of Open Access Journals (Sweden)

    Vladimir Drozg

    2016-12-01

    Full Text Available This paper focuses on the city at night. The distinctive aspect of the discussed topic is the time dimension of spaces and areas – places that “live” at night. The night has economic, cultural, social and formal elements; and it is these elements that underpin how we see and come to know the city at night. A range of topics have been explored: places of retailing and consumption, workplaces, places of entertainment, places that embody the night image of the city and places of socially unacceptable, delinquent behaviour. In the empirical part, we examined the city of Maribor, Slovenia.

  14. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  15. Night vision: changing the way we drive

    Science.gov (United States)

    Klapper, Stuart H.; Kyle, Robert J. S.; Nicklin, Robert L.; Kormos, Alexander L.

    2001-03-01

    A revolutionary new Night Vision System has been designed to help drivers see well beyond their headlights. From luxury automobiles to heavy trucks, Night Vision is helping drivers see better, see further, and react sooner. This paper describes how Night Vision Systems are being used in transportation and their viability for the future. It describes recent improvements to the system currently in the second year of production. It also addresses consumer education and awareness, cost reduction, product reliability, market expansion and future improvements.

  16. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  17. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  19. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. Night lights and regional income inequality in Africa

    DEFF Research Database (Denmark)

    Mveyange, Anthony Francis

    Estimating regional income inequality in Africa has been challenging due to the lack of reliable and consistent sub-national income data. I employ night lights data to circumvent this limitation. I find significant and positive associations between regional inequality visible through night lights...... and income in Africa. Thus, in the absence of income data, we can construct regional inequality proxies using night lights data. Further investigation on the night lights-based regional inequality trends reveals two main findings: first, increasing regional inequality trends between 1992 and 2003; and second......, declining regional inequality trends between 2004 and 2012....

  2. Dry eye signs and symptoms in night-time workers

    OpenAIRE

    Ali Makateb; Hamed Torabifard

    2017-01-01

    Purpose: To determine the effect of night-time working on dry eye signs and symptoms. Methods: A total of 50 healthy subjects completed a dry eye questionnaire and underwent clinical examinations including basic Schirmer's test and tear breakup time (TBUT) test on two consecutive days, before and after the night shift (12-hrs night-shift). Results: All dry eye symptoms were aggravated significantly after the night shift (P 

  3. Solar Neutrino Day-Night Effect

    International Nuclear Information System (INIS)

    Blennow, Mattias; Ohlsson, Tommy; Snellman, Hakan

    2005-01-01

    We summarize the results of Ref. [M. Blennow, T. Ohlsson and H. Snellman, Phys. Rev. D 69 (2004) 073006, hep-ph/0311098] in which we determine the effects of three flavor mixing on the day-night asymmetry in the flux of solar neutrinos. Analytic methods are used to determine the difference in the day and night solar electron neutrino survival probabilities and numerical methods are used to determine the effect of three flavor mixing at detectors

  4. Science by night – it's magic!

    CERN Document Server

    CERN Bulletin

    2010-01-01

    The control rooms of the LHC and its experiments threw open their doors to 150 youngsters on European Researchers Night and the place was buzzing with excitement all evening!    It's just possible that a few scientists' vocations were born last Friday night, as the sixth European Researchers Night took place across Europe. CERN was taking part for the first time and invited young people aged from 12 to 19 into the control rooms of the LHC machine and five experiments. From 5.00 in the afternoon until 1.00 in the morning, 150 youngsters and physics teachers got the opportunity to sit with scientists at the controls of the accelerator and experiments. This meeting of minds went down very well for all concerned, the scientists being only too happy to wax lyrical about their passion. The youngsters were thrilled with their visit and amazed at being allowed so close to the controls of these mighty machines. The night-time setting added an extra touch of magic to the whole event. Some just could...

  5. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  6. Night Shift Work and Risk of Breast Cancer.

    Science.gov (United States)

    Hansen, Johnni

    2017-09-01

    Night work is increasingly common and a necessity in certain sectors of the modern 24-h society. The embedded exposure to light-at-night, which suppresses the nocturnal hormone melatonin with oncostatic properties and circadian disruption, i.e., misalignment between internal and external night and between cells and organs, are suggested as main mechanisms involved in carcinogenesis. In 2007, the International Agency for Research on Cancer (IARC) classified shift work that involves circadian disruption as probably carcinogenic to humans based on limited evidence from eight epidemiologic studies on breast cancer, in addition to sufficient evidence from animal experiments. The aim of this review is a critical update of the IARC evaluation, including subsequent and the most recent epidemiologic evidence on breast cancer risk after night work. After 2007, in total nine new case-control studies, one case-cohort study, and eight cohort studies are published, which triples the number of studies. Further, two previous cohorts have been updated with extended follow-up. The assessment of night shift work is different in all of the 26 existing studies. There is some evidence that high number of consecutive night shifts has impact on the extent of circadian disruption, and thereby increased breast cancer risk, but this information is missing in almost all cohort studies. This in combination with short-term follow-up of aging cohorts may explain why some cohort studies may have null findings. The more recent case-control studies have contributed interesting results concerning breast cancer subtypes in relation to both menopausal status and different hormonal subtypes. The large differences in definitions of both exposure and outcome may contribute to the observed heterogeneity of results from studies of night work and breast cancer, which overall points in the direction of an increased breast cancer risk, in particular after over 20 years of night shifts. Overall, there is a

  7. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  8. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  9. Night-time warming and the greenhouse effect

    International Nuclear Information System (INIS)

    Kukla, G.; Karl, T.R.

    1993-01-01

    Studies of temperature data collected mainly from rural stations in North America, China, the Commonwealth of Independent States, Australia, Sudan, Japan, Denmark, Northern Finland, several Pacific Islands, Pakistan, South Africa and Europe suggest that the reported warming of the Northern Hemisphere since WWII is principally a result of an increase in night-time temperatures. The average monthly maximum and minimum temperatures, as well as the mean diurnal temperature range (DTR), were calculated for various regions from data supplied by 1000 stations from 1951 to 1990. Average and minimum temperatures generally rose during the analysed interval and the rise in night-time temperatures was more pronounced than the increase in daily maximum temperatures. As a result, the mean DTR decreased almost everywhere. The most probable causes of the rise in night-time temperatures are: an increase in cloudiness owing to natural changes in the circulation patterns of oceans and the atmosphere; increased cloud cover density caused by industrial pollution; urban heat islands, generated by cities, which are strongest during the night; irrigation which keeps the surface warmer at night and cooler by day; and anthropogenic greenhouse gases. 18 refs., 3 figs

  10. Dewey's Ethical Justification for Public Deliberation Democracy

    Science.gov (United States)

    Shook, John

    2013-01-01

    Interpretations of John Dewey's political theory grasp his respect for public deliberation, but typically overlook his ethical justification for democracy. Dewey gave two primary reasons why democracy is superior to other forms of government. First, a public educated in the tools of social intelligence can be more effective at managing their…

  11. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  12. Light Pollution Awareness through Globe at Night & IYL2015

    Science.gov (United States)

    Walker, Constance E.

    2015-01-01

    The International Astronomical Union (IAU) will be coordinating extensive activities to raise awareness of light pollution through running the Cosmic Light theme of the International Year of Light (IYL2015) and by partnering in particular with the popular Globe at Night program.Globe at Night (www.globeatnight.org) is an international campaign to raise public awareness of the impact of light pollution by having people measure night-sky brightness and submit observations in real-time with smart phone or later with a computer. In 2015, Globe at Night will run for 10-nights each month, an hour after sunset til before the Moon rises. Students can use the data to monitor levels of light pollution around the world, as well as understand light pollution's effects on energy consumption, plants, wildlife, human health and our ability to enjoy a starry night sky.Since its inception in 2006, more than 115,000 measurements from 115 countries have been reported. The last 9 years of data can be explored with Globe at Night's interactive world map or with the 'map app' to view a particular area. A spreadsheet of the data is downloadable from any year. One can compare Globe at Night data with a variety of other databases to see, for example, how light pollution affects the foraging habits of bats.To encourage public participation in Globe at Night during IYL2015, each month will target an area of the world that habitually contributes during that time. Special concerns for how light pollution affects that area and solutions will be featured on the Globe at Night website (www.globeatnight.org), through its Facebook page, in its newsletter or in the 365DaysofAstronomy.org podcasts.Twice during IYL there will be a global Flash Mob event, one on Super Pi Day (March 14, 2015) and a second in mid-September, where the public will be invited to take night-sky brightness measurements en masse. In April, the International Dark-Sky Week hosted by the International Dark-Sky Association will be

  13. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  14. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  15. Suicide attempts by deliberate self-poisoning in children and adolescents

    Czech Academy of Sciences Publication Activity Database

    Zakharov, S.; Navrátil, Tomáš; Pelclová, D.

    2013-01-01

    Roč. 210, č. 1 (2013), s. 302-307 ISSN 0165-1781 Institutional support: RVO:61388955 Keywords : Deliberate suicidal self-poisoning * Suicide attempts in children and adolescents * Czech Toxicological Information Centre Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 2.682, year: 2013

  16. Enacting Ethics: Bottom-up Involvement in Implementing Moral Case Deliberation

    NARCIS (Netherlands)

    Weidema, F.C.; Molewijk, A.C.; Widdershoven, G.A.M.; Abma, T.A.

    2012-01-01

    In moral case deliberation (MCD), healthcare professionals meet to reflect upon their moral questions supported by a structured conversation method and non-directive conversation facilitator. An increasing number of Dutch healthcare institutions work with MCD to (1) deal with moral questions, (2)

  17. A night with good vibrations

    CERN Multimedia

    2002-01-01

    For its third edition, the Museum d'histoire des sciences invites you to a Science Night under the banner of waves and undulations. Scientists, artists and storytellers from more than forty institutes and local or regional associations will show in only one weekend that waves and undulations form an integral part of our daily environment. Telephones, televisions, radios, irons, lighting, music, sun rays, stars, rainbows, earthquakes and other natural phenomena - all produce, emit or receive waves or undulations. The visitors attending the Night will be able to get in contact with the nature of waves through interactive exhibitions on sound and light and through hands-on demonstrations arranged around the Bartholoni villa and in the Park of the Perle du lac. An amusing and distracting way to familiarize yourself with the concepts of wavelength, frequency and interference lengths... In addition to the stands, the Night will offer many other activities: reconstructions of critical experiments, scientific consu...

  18. A night with good vibrations

    CERN Multimedia

    2002-01-01

    Next week-end, the Geneva Science History Museum invites you to a Science Night under the banner of waves and vibrations. Scientists, artists and storytellers from more than forty institutes and local or regional associations will show that waves and vibrations form an integral part of our environment. You will be able to get in contact with the nature of waves through interactive exhibitions on sound and light and through hands-on demonstrations arranged in the Park of the Perle du Lac. On the CERN stand, you will be able to measure the speed of light with a bar of chocolate, and understand the scattering of waves with plastic ducks. Amazing, no? In addition to the stands, the Night will offer many other activities: reconstructions of experiments, a play, a concert of crystal glasses, an illuminated fountain, a house of spirits. More information Science Night, 6 and 7 July, Park of the Perle du Lac, Geneva

  19. Pragmatism, metaphysics, and bioethics: beyond a theory of moral deliberation.

    Science.gov (United States)

    Pamental, Matthew

    2013-12-01

    Pragmatism has been understood by bioethicists as yet another rival in the "methods wars," as yet another theory of moral deliberation. This has led to criticism of pragmatic bioethics as both theoretically and practically inadequate. Pragmatists' responses to these objections have focused mainly on misunderstandings of pragmatism's epistemology. These responses are insufficient. Pragmatism's commitment to radical empiricism gives it theoretical resources unappreciated by critics and defenders alike. Radical empiricism, unlike its more traditional ancestors, undercuts the gaps between theory and practice, and subjective and objective accounts of experience, and in so doing provides the metaphysical and epistemological basis for a thoroughgoing empirical naturalism in ethics. Pragmatism's strength as an approach to moral problems thus emerges as a result of a much wider array of resources than contemporary interpreters have acknowledged, which makes it a richer, deeper framework for understanding moral deliberation in general and bioethical decision making in particular.

  20. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  1. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  2. Deliberation before determination: the definition and evaluation of good decision making.

    Science.gov (United States)

    Elwyn, Glyn; Miron-Shatz, Talya

    2010-06-01

    In this article, we examine definitions of suggested approaches to measure the concept of good decisions, highlight the ways in which they converge, and explain why we have concerns about their emphasis on post-hoc estimations and post-decisional outcomes, their prescriptive concept of knowledge, and their lack of distinction between the process of deliberation, and the act of decision determination. There has been a steady trend to involve patients in decision making tasks in clinical practice, part of a shift away from paternalism towards the concept of informed choice. An increased understanding of the uncertainties that exist in medicine, arising from a weak evidence base and, in addition, the stochastic nature of outcomes at the individual level, have contributed to shifting the responsibility for decision making from physicians to patients. This led to increasing use of decision support and communication methods, with the ultimate aim of improving decision making by patients. Interest has therefore developed in attempting to define good decision making and in the development of measurement approaches. We pose and reflect whether decisions can be judged good or not, and, if so, how this goodness might be evaluated. We hypothesize that decisions cannot be measured by reference to their outcomes and offer an alternative means of assessment, which emphasizes the deliberation process rather than the decision's end results. We propose decision making comprises a pre-decisional process and an act of decision determination and consider how this model of decision making serves to develop a new approach to evaluating what constitutes a good decision making process. We proceed to offer an alternative, which parses decisions into the pre-decisional deliberation process, the act of determination and post-decisional outcomes. Evaluating the deliberation process, we propose, should comprise of a subjective sufficiency of knowledge, as well as emotional processing and

  3. Detecting the Evolution of Deliberate Fertility Control before the Demographic Transition in Germany

    Directory of Open Access Journals (Sweden)

    Aliaksandr Amialchuk

    2012-10-01

    Full Text Available BACKGROUND Pervious literature has established the existence of deliberate non-parity-specific fertility control in pre-transitional populations. However, less focus has been given to the timing of its onset. In addition, previous studies focused on the changes in fertility in response to the local prices of grains, which may be endogenous. OBJECTIVE This paper studies the emergence and evolution of deliberate fertility control by investigating the link between child mortality and economic stress on the one hand and non-parity-specific birth control on the other, in historic German villages between 1700 and 1900. METHODS Birth histories from fourteen German villages (1700-1900 and rye price series are used in a micro-level event history analysis. The fertility response of second and higher-order births to the mortality of children over age two and exogenous fluctuations in rye price are used as measures of the extent of deliberate non-parity-specific birth control. RESULTS Over the course of the demographic transition, the effect of the death of children generally increases after controlling for the effect of the death of children less than two years old. The negative fertility response to high rye prices before and in the year immediately following the price change occurred only after 1800. CONCLUSIONS The replacement and insurance effects associated with child mortality generally increased before the demographic transition. The emergence of the negative effect of high rye prices on fertility after 1800 further supports the presence and evolution of deliberate non-parity-specific fertility control before the demographic transition.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  6. Client participation in moral case deliberation: a precarious relational balance

    NARCIS (Netherlands)

    Weidema, F.C.; Abma, T.A.; Widdershoven, G.A.M.; Molewijk, A.C.

    2011-01-01

    Moral case deliberation (MCD) is a form of clinical ethics support in which the ethicist as facilitator aims at supporting professionals with a structured moral inquiry into their moral issues from practice. Cases often affect clients, however, their inclusion in MCD is not common. Client

  7. Cognitive and Contextual Correlates of Spontaneous and Deliberate Mind-Wandering

    Science.gov (United States)

    Robison, Matthew K.; Unsworth, Nash

    2018-01-01

    Individuals with greater cognitive abilities generally show reduced rates of mind-wandering when completing relatively demanding tasks (Randall, Oswald, & Beier, 2014). However, it is yet unclear whether elevated rates of mind-wandering among low-ability individuals are manifestations of deliberate, intentional episodes of mind-wandering…

  8. Public Deliberation on Government-managed Social Media

    DEFF Research Database (Denmark)

    Medaglia, Rony; Zhu, Demi

    2017-01-01

    – characterised by exposure to different opinions, mutual understanding, and reasonableness – or hinder them, resulting in increased homophily and polarisation. Using the theoretical lens of public deliberation, this study investigates attitudinal and cognitive aspects of user conversations on government......-managed social media accounts. Drawing on a survey of 417 users of the Chinese social media platform Weibo, our findings show that interactions on social media are mostly non-dialogical and non-creative in nature, and characterised by homophily and polarisation, even though users perceive their interactions...

  9. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  10. Speed or deliberation: a comparison of post-disaster recovery in Japan, Turkey, and Chile.

    Science.gov (United States)

    Platt, Stephen; So, Emily

    2017-10-01

    This paper compares recovery in the wake of three recent earthquakes: the Great East Japan Earthquake in March 2011; the Van earthquake in Turkey in October 2011; and the Maule earthquake in Chile in February 2010. The authors visited all three locations approximately 12-18 months after the incidents and interviewed earthquake specialists, disaster managers, urban planners, and local authorities. A key challenge to post-disaster recovery planning is balancing speed and deliberation. While affected communities must rebuild as quickly as possible, they must also seek to maximise the opportunities for improvement that disasters provide. The three case studies bring this dilemma into stark relief, as recovery was respectively slow, fast, and just right in the aftermath of the events: the Government of Japan adopted a deliberate approach to recovery and reconstruction; speed was of the essence in Turkey; and an effective balance between speed and deliberation was achieved in Chile. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  12. Deliberate practice is necessary but not sufficient to explain individual differences in piano sight-reading skill: the role of working memory capacity.

    Science.gov (United States)

    Meinz, Elizabeth J; Hambrick, David Z

    2010-07-01

    Deliberate practice-that is, engagement in activities specifically designed to improve performance in a domain-is strongly predictive of performance in domains such as music and sports. It has even been suggested that deliberate practice is sufficient to account for expert performance. Less clear is whether basic abilities, such as working memory capacity (WMC), add to the prediction of expert performance, above and beyond deliberate practice. In evaluating participants having a wide range of piano-playing skill (novice to expert), we found that deliberate practice accounted for nearly half of the total variance in piano sight-reading performance. However, there was an incremental positive effect of WMC, and there was no evidence that deliberate practice reduced this effect. Evidence indicates that WMC is highly general, stable, and heritable, and thus our results call into question the view that expert performance is solely a reflection of deliberate practice.

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  15. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  16. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  17. Childhood night terrors and sleepwalking: diagnosis and treatment

    OpenAIRE

    Sachin Ratan Gedam; Pradeep S. Patil; Imran Ali Shivji

    2017-01-01

    Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to...

  18. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  19. Short-term and long-term effects of psychosocial therapy for people after deliberate self-harm

    DEFF Research Database (Denmark)

    Erlangsen, Annette; Lind, Bertel Dam; Stuart, Elizabeth A

    2015-01-01

    BACKGROUND: Although deliberate self-harm is a strong predictor of suicide, evidence for effective interventions is missing. The aim of this study was to examine whether psychosocial therapy after self-harm was linked to lower risks of repeated self-harm, suicide, and general mortality. METHODS......: In this matched cohort study all people who, after deliberate self-harm, received a psychosocial therapy intervention at suicide prevention clinics in Denmark during 1992-2010 were compared with people who did not receive the psychosocial therapy intervention after deliberate self-harm. We applied propensity...... score matching with a 1:3 ratio and 31 matching factors, and calculated odds ratios for 1, 5, 10, and 20 years of follow-up. The primary endpoints were repeated self-harm, death by suicide, and death by any cause. FINDINGS: 5678 recipients of psychosocial therapy (followed up for 42·828 person...

  20. Working night shifts affects surgeons' biological rhythm

    DEFF Research Database (Denmark)

    Amirian, Ilda; Andersen, Lærke T; Rosenberg, Jacob

    2015-01-01

    BACKGROUND: Chronic sleep deprivation combined with work during the night is known to affect performance and compromise residents' own safety. The aim of this study was to examine markers of circadian rhythm and the sleep-wake cycle in surgeons working night shifts. METHODS: Surgeons were monitor...

  1. Definitions of night eating in adolescent girls

    NARCIS (Netherlands)

    Striegel-Moore, RH; Thompson, D; Franko, DL; Barton, B; Affenito, S; Schreiber, GB; Daniels, [No Value

    Objective: To describe the prevalence of night eating in a community cohort of black and white girls, using different definitions of night eating as described in the literature. Research Methods and Procedures: Three-day food diaries collected as part of the National Growth and Health Study were

  2. Non-conscious vs. deliberate dynamic decision-making—a pilot experiment

    NARCIS (Netherlands)

    Grössler, A.; Rouwette, E.A.J.A.; Vennix, J.A.M.; Größler, A.

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for

  3. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  4. A Deliberate Practice Instructional Approach for Upper Division Physics Courses

    Science.gov (United States)

    Jones, David

    2015-05-01

    In upper division physics courses, an overarching educational goal is to have students think about and use the material much as a practicing physicist in the field does. Specifically, this would include knowledge (such as concepts, formalism, and instruments), approaches, and metacognitive skills that physicists use in solving ``typical'' (research context) problems to both understand and predict physical observations and accompanying models. Using an interactive instructional approach known as deliberate practice (described earlier in this session) we will discuss our work on how to provide students with the necessary practice and feedback to achieve these skills in a core DAMOP course of modern optics. We present the results of a direct and explicit comparison between this approach and traditional lecture-based instruction revealing evidence that a significant improvement of the students' mastery of these skills occurs when deliberate practice is employed. Our work was supported by the University of British Columbia through the CWSEI.

  5. Day and night grazing by cattle in the Sahel

    NARCIS (Netherlands)

    Ayantunde, A.A.; Fernandez-Rivera, S.; Hiernaux, P.H.; Keulen, van H.; Udo, H.M.J.

    2002-01-01

    The influence of night grazing on feeding behavior, nutrition and performance of cattle was studied. Twenty-four steers weighing 367 kg (SD = 76) grazed either from 0900 to 1900 (day grazers), 2100 to 0700 (night grazers) or 0900 to 1900 and 2400 to 0400 (day-and-night grazers) during 13 weeks. Four

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  8. The observer's year 366 nights in the universe

    CERN Document Server

    Moore, Patrick

    2005-01-01

    This is a night by night account of the stars. For every night of the year Sir Patrick Moore gives the reader details of interesting objects that can be seen from earth. It is a book for people with a wide interest in astronomy, those who may not have specialised in a specific area of astronomy and wish to expand their knowledge in all areas. This second edition is updated for astronomical events through until 2010.

  9. Jupiter Night and Day

    Science.gov (United States)

    2001-01-01

    Day and night side narrow angle images taken on January 1, 2001 illustrating storms visible on the day side which are the sources of visible lightning when viewed on the night side. The images have been enhanced in contrast. Note the two day-side occurrences of high clouds, in the upper and lower parts of the image, are coincident with lightning storms seen on the darkside. The storms occur at 34.5 degrees and 23.5 degrees North latitude, within one degree of the latitudes at which similar lightning features were detected by the Galileo spacecraft. The images were taken at different times. The storms' longitudinal separation changes from one image to the next because the winds carrying them blow at different speeds at the two latitudes.

  10. Travelers In The Night

    Science.gov (United States)

    Grauer, Albert D.

    2014-11-01

    Travelers In The Night is an engaging and informative series of two minute radio programs about asteroids, comets, spacecraft, and other objects in space. The pieces are evergreen in that they are current but not dated. They are published on the Public Radio Exchange and carried by a number of radio stations. For teachers, students, and kids of all ages, the script for each piece and the start of a path for further inquiry can be found on the website travelersinthenight.org . The Travelers InThe Night Pieces are written and produced by an observing member of the Catalina Sky Survey Team at the University of Arizona. DPS members are encouraged to submit program ideas which can be developed to feature their research efforts.

  11. Deliberate self-harm before psychiatric admission and risk of suicide

    DEFF Research Database (Denmark)

    Madsen, Trine; Agerbo, Esben; Mortensen, Preben Bo

    2013-01-01

    Psychiatric illness and deliberate self-harm (DSH) are major risk factors of suicide. In largely 15 % of psychiatric admissions in Denmark, the patient had an episode of DSH within the last year before admission. This study examined the survival and predictors of suicide in a suicidal high...

  12. [Night work, shift work: Breast cancer risk factor?].

    Science.gov (United States)

    Benabu, J-C; Stoll, F; Gonzalez, M; Mathelin, C

    2015-12-01

    The aim of this review was to determine the link between night/shift work and breast cancer. The analysed articles were taken from the PUBMED database between 1996 and 2015. The keywords used were "breast cancer risk", "night work" and "shift work". In total, 25 articles were selected. Night/shift workers are more at risk to develop a breast cancer (relative risk (RR) between 1.09; 95% CI: 1.02-1.20 and 1.48; 95% CI: 1.36-1.61 in the meta-analyses). However, this risk is not found by some cohort and case-control studies. The circadian rhythm disruption, responsible of disorderliness of melatonin secretion, could be one of the mechanisms involved in the increase of that risk. Hormonal status of night/shift workers, their geographic origin, their lifestyle and their vitamin D deficiency appear as other mechanisms potentially responsible for increased risk of cancer in this professional population. Moreover, a dose-effect connection may exist, with an increase of the risk with the number of years of night/shift work. Night/shift work is associated with a moderate increased risk of breast cancer, especially among women who worked over 20 years. Recommendations concerning the breast monitoring in this population could be diffused. The benefit of melatonin supplementation remains to be assessed. Copyright © 2015. Published by Elsevier SAS.

  13. Deliberate Self-Harm in Adolescence: A Challenge for Schools

    Science.gov (United States)

    Best, Ron

    2006-01-01

    Acts of deliberate self-harm (DSH) by adolescents are thought to be on the increase. Many of those who self-harm are of school age and it is to be expected that schools (and their teachers) will be aware of the problem and will respond appropriately as part of their pastoral-care provision. However, a recent survey of research in pastoral care and…

  14. Adapting the coping in deliberation (CODE) framework: a multi-method approach in the context of familial ovarian cancer risk management.

    Science.gov (United States)

    Witt, Jana; Elwyn, Glyn; Wood, Fiona; Rogers, Mark T; Menon, Usha; Brain, Kate

    2014-11-01

    To test whether the coping in deliberation (CODE) framework can be adapted to a specific preference-sensitive medical decision: risk-reducing bilateral salpingo-oophorectomy (RRSO) in women at increased risk of ovarian cancer. We performed a systematic literature search to identify issues important to women during deliberations about RRSO. Three focus groups with patients (most were pre-menopausal and untested for genetic mutations) and 11 interviews with health professionals were conducted to determine which issues mattered in the UK context. Data were used to adapt the generic CODE framework. The literature search yielded 49 relevant studies, which highlighted various issues and coping options important during deliberations, including mutation status, risks of surgery, family obligations, physician recommendation, peer support and reliable information sources. Consultations with UK stakeholders confirmed most of these factors as pertinent influences on deliberations. Questions in the generic framework were adapted to reflect the issues and coping options identified. The generic CODE framework was readily adapted to a specific preference-sensitive medical decision, showing that deliberations and coping are linked during deliberations about RRSO. Adapted versions of the CODE framework may be used to develop tailored decision support methods and materials in order to improve patient-centred care. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Behavioral management of night eating disorders

    Directory of Open Access Journals (Sweden)

    Berner LA

    2013-03-01

    Full Text Available Laura A Berner,1 Kelly C Allison2 1Department of Psychology, Drexel University, 2Department of Psychiatry, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA Abstract: Night eating syndrome (NES is a form of disordered eating associated with evening hyperphagia (overeating at night and nocturnal ingestions (waking at night to eat. As with other forms of disordered eating, cognitive and behavioral treatment modalities may be effective in reducing NES symptoms. This review presents evidence for a variety of behavioral treatment approaches, including behavioral therapy, phototherapy, behavioral weight loss treatment, and cognitive-behavioral therapy. A more detailed overview of cognitive-behavioral therapy for NES is provided. All of these studies have been case studies or included small samples, and all but one have been uncontrolled, but the outcomes of many of these approaches are promising. Larger randomized controlled trials are warranted to advance NES treatment literature. With the inclusion of NES in the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5 as a “Feeding or Eating Disorder Not Elsewhere Classified,” more sophisticated, empirically-supported, behaviorally-based treatment approaches are much needed. Keywords: night eating syndrome, cognitive-behavioral treatment, phototherapy, behavioral weight loss, behavior therapy

  16. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  17. Supportive leadership in Swedish community night nursing.

    Science.gov (United States)

    Gustafsson, Christine; Fagerberg, Ingegerd; Asp, Margareta

    2010-10-01

    The aim of the present study was to examine the support night nurses' give to staff in community night nursing. Studies have shown that support given to staff is one of night registered nurses' (RNs') experiences of the meaning of caring. This support, that community RNs display for staff in night-time care, is sparsely described. All community night-duty nurses in a medium-sized municipal in Sweden participated in the present study. Thematic content analysis was used to analyse data from observations. The support given by RNs to staff is described using three themes: (1) a conditional supporting stance, (2) preparing propitious conditions for caring and (3) confidence in the abilities of individual staff members and adaptation to their individual needs. The results reveal that RNs consider support to staff in terms of nursing leadership. Out of 'concern for the staff' the RNs try to be there for them, which corresponds to nursing leadership. Such concern also arises from the RNs' awareness that by giving support to staff this affects the staffs' caring for older people. The current municipal social care organization of community nursing of older people in which RNs have extensive responsibilities with insufficient control, is a working condition with a risk for decreased quality of care and a high risk for work-related stress syndrome. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.

  18. The feast "STAR NIGHT 2009" in Shumen, Bulgaria

    Science.gov (United States)

    Kyurkchieva, Diana P.

    Information about the preparation and realization of the attractive program for the "Star Night" on September 25, 2009, in Shumen, is presented. Its goal is popularization of the European initiative "Research Night" in Bulgaria.

  19. Cooperation, Fast and Slow: Meta-Analytic Evidence for a Theory of Social Heuristics and Self-Interested Deliberation.

    Science.gov (United States)

    Rand, David G

    2016-09-01

    Does cooperating require the inhibition of selfish urges? Or does "rational" self-interest constrain cooperative impulses? I investigated the role of intuition and deliberation in cooperation by meta-analyzing 67 studies in which cognitive-processing manipulations were applied to economic cooperation games (total N = 17,647; no indication of publication bias using Egger's test, Begg's test, or p-curve). My meta-analysis was guided by the social heuristics hypothesis, which proposes that intuition favors behavior that typically maximizes payoffs, whereas deliberation favors behavior that maximizes one's payoff in the current situation. Therefore, this theory predicts that deliberation will undermine pure cooperation (i.e., cooperation in settings where there are few future consequences for one's actions, such that cooperating is not in one's self-interest) but not strategic cooperation (i.e., cooperation in settings where cooperating can maximize one's payoff). As predicted, the meta-analysis revealed 17.3% more pure cooperation when intuition was promoted over deliberation, but no significant difference in strategic cooperation between more intuitive and more deliberative conditions. © The Author(s) 2016.

  20. Peer sexual harassment and deliberate self-injury: longitudinal cross-lag investigations in Canada and Sweden.

    Science.gov (United States)

    Marshall, Sheila K; Faaborg-Andersen, Pernille; Tilton-Weaver, Lauree C; Stattin, Håkan

    2013-12-01

    Although the receipt of peer sexual harassment in schools has been linked to deliberate self-injury, the direction of association over time has not been tested. Two longitudinal studies examined whether receipt of peer sexual harassment within schools predicts engagement in deliberate self-injury or vice versa. Differences between boys and girls were also tested. Surveys were conducted in two countries, Canada and Sweden. Measures of sexual harassment and deliberate self-injury were administered yearly in classrooms. Two waves of data were collected in the Canadian study (N = 161, 59.6% girls, mean age = 13.82 years); three waves of data were collected in Sweden (N = 513, 47% girls, mean age = 13.23 years). In the Canadian study, deliberate self-injury predicted subsequent peer sexual harassment; the converse relationship was not significant. No significant gender differences were found. Across the three waves of the Swedish study, peer sexual harassment predicted self-injury from T1 to T2, and self-injury predicted peer sexual harassment from T2 to T3. However, self-injury did not mediate peer sexual harassment at T1 and T3. Tests of gender differences revealed self-injury predicted sexual harassment from T2 to T3 among Swedish girls but not boys. Adolescents who deliberately self-injure may be vulnerable to sexual harassment by peers at school. Cultural norms may have a role in whether this process applies primarily to girls or to both genders. Sexual harassment by peers may also increase self-injury, but this is not subsequently linked to increases in receipt of sexual harassment. Copyright © 2013 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Heart rate variability changes in physicians working on night call.

    Science.gov (United States)

    Malmberg, Birgitta; Persson, Roger; Flisberg, Per; Ørbaek, Palle

    2011-03-01

    Adverse effects by night-call duty have become an important occupational health issue. The aim of this study was to investigate whether the heart rate variability (HRV) differed during recovery from day work and night-call duty between distinct physician specialities. We studied the impact of a 16-h night-call duty on autonomic balance, measured by HRV, among two physician groups differing with respect to having to deal with life-threatening conditions while on call. Nineteen anaesthesiologists (ANEST) and 16 paediatricians and ear, nose and throat surgeons (PENT) were monitored by ambulatory digital Holter electrocardiogram (ECG). Heart rate variability was analysed between 21:00 and 22:00 after an ordinary workday, on night call and in the evening post-call. Absolute and normalized high-frequency power (HF, HFnu) were the main outcome variables, expressing parasympathetic influence on the heart. ANEST had lower HF power than PENT while on night call and post-daytime work (p work compared with post-night-call duty (p balance and did not differ between specialities. However, the less dynamic HRV after daytime work and during night-call duty in the ANEST group may indicate a higher physiological stress level. These results may contribute to the improvement of night-call schedules within the health care sector.

  2. Motive Matters! An exploration of the notion ‘deliberate breach of contract’ and its consequences for the application of remedies

    OpenAIRE

    Kogelenberg, Martijn

    2012-01-01

    textabstractThis thesis explores the notion of deliberate breach of contract and its potential remedial consequences. In the major jurisdictions in Europe and in the United States the notion of deliberate breach of contract is generally not coherently and officially defined and acknowledged as an independent legal phenomenon. The ultimate added value of this thesis intends to be a first coherent comparative research on deliberate breach of contract and its potential consequences for the core ...

  3. 'What the hell is water?' How to use deliberate clinical inertia in common emergency department situations.

    Science.gov (United States)

    Egerton-Warburton, Diana; Cullen, Louise; Keijzers, Gerben; Fatovich, Daniel M

    2018-06-01

    Appropriate deliberate clinical inertia refers to the art of doing nothing as a positive clinical response. It includes shared decision-making to improve patient care with the use of clinical judgement. We discuss common clinical scenarios where the use of deliberate clinical inertia can occur. The insertion of peripheral intravenous cannulae, investigating patients with suspected renal colic and the investigation of low risk chest pain are all opportunities for the thoughtful clinician to 'stand there' and use effective patient communication to avoid low value tests and procedures. Awareness is key to identifying these opportunities to practice deliberate clinical inertia, as many of the situations may be so much a part of our environment that they are hidden in plain view. © 2018 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  4. Organizing moral case deliberation experiences in two Dutch nursing homes

    NARCIS (Netherlands)

    van der Dam, S.; Abma, T.A.; Molewijk, A.C.; Kardol, M.J.M.; Schols, J.M.G.A.

    2011-01-01

    Moral case deliberation (MCD) is a specific form of clinical ethics, aiming to stimulate ethical reflection in daily practice in order to improve the quality of care. This article focuses on the implementation of MCD in nursing homes and the questions how and where to organize MCD. The purpose of

  5. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  6. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  7. The significance of internet communication in public deliberation:

    OpenAIRE

    Rasmussen, Terje

    2009-01-01

    The article addresses recent structural changes in the public sphere related to media as platforms for debate and deliberation. New media platforms for communication lead to changes in the communication structure itself. This can easily be seen in the differentiation processes of the public sphere that is now taking place: The differentiation of topics, styles and actors is an astonishing phenomenon, is constantly a topic of debate in itself, often labelled as both decay and democratisation. ...

  8. The Quality of Deliberation in Two Committees of the European Parliament: The Neglected Influence of the Situational Context and the Policymaking Stage

    Directory of Open Access Journals (Sweden)

    Léa Roger

    2013-10-01

    Full Text Available In our paper we try to answer two empirical research questions. First, we assess the deliberative quality of discussions in two committees of the EU Parliament. In order to do so, we use a slightly revised version of the DQI. Second, we identify and empirically measure those variables that systematically influence the quality of deliberation in interviews with debate actors. We argue that the quality of deliberation in EU committees is influenced by two normative values: deliberation (common good orientation and responsiveness (particular interest orientation, with the guiding value determined by the particular situation. Using a multidimensional concept of deliberation, we empirically test the impact of situational variables on specific aspects of deliberative quality. In addition, we take into account the temporal dimension of deliberation.

  9. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  10. Patient Handoffs: Is Cross Cover or Night Shift Better?

    Science.gov (United States)

    Higgins, Alanna; Brannen, Melissa L; Heiman, Heather L; Adler, Mark D

    2017-06-01

    Studies show singular handoffs between health care providers to be risky. Few describe sequential handoffs or compare handoffs from different provider types. We investigated the transfer of information across 2 handoffs using a piloted survey instrument. We compared cross-cover (every fourth night call) with dedicated night-shift residents. Surveys assessing provider knowledge of hospitalized patients were administered to pediatric residents. Primary teams were surveyed about their handoff upon completion of daytime coverage of a patient. Night-shift or cross-covering residents were surveyed about their handoff of the same patient upon completion of overnight coverage. Pediatric hospitalists rated the consistency of information between the surveys. Absolute difference was calculated between the 2 providers' rating of a patient's (a) complexity and (b) illness severity. Scores were compared across provider type. Fifty-nine complete handoff pairs were obtained. Fourteen and 45 handoff surveys were completed by a cross-covering and a night-shift provider, respectively. There was no significant difference in information consistency between primary and night-shift (median, 4.0; interquartile range [IQR], 3-4) versus primary and cross-covering providers (median, 4.0; IQR, 3-4). There was no significant difference in median patient complexity ratings (night shift, 3.0; IQR, 1-5, versus cross cover, 3.5; IQR, 1-5) or illness severity ratings (night shift, 2.0; IQR, 1-4, versus cross-cover, 3.0; IQR, 1-6) when comparing provider types giving a handoff. We did not find a difference in physicians' transfer of information during 2 handoffs among providers taking traditional call or on night shift. Development of tools to measure handoff consistency is needed.

  11. Night shift fatigue among anaesthesia trainees at a major metropolitan teaching hospital.

    Science.gov (United States)

    Lancman, B M

    2016-05-01

    Night shifts expose anaesthesia trainees to the risk of fatigue and, potentially, fatigue-related performance impairment. This study examined the workload, fatigue and coping strategies of anaesthesia trainees during night shifts. A blinded survey-based study was undertaken at a major single centre metropolitan teaching hospital in Australia. All ten anaesthesia trainees who worked night shifts participated. The survey collected data on duration of night shifts, workload, and sleep patterns. Fatigue was assessed using the Karolinska Sleepiness Scale (KSS). There were 93 night shifts generating data out of a potential 165. Trainees tended to sleep an increasing amount before their shift as the nights progressed from 1 to 5. Night 1 was identified as an 'at risk' night due to the amount of time spent awake before arriving at work (32% awake for U+003E8 hours); on all other nights trainees were most likely to have slept 6-8 hours. The KSS demonstrated an increase in sleepiness of 3 to 4 points on the scale from commencement to conclusion of a night shift. The Night 1 conclusion sleepiness was markedly worse than any other night with 42% falling into an 'at-risk' category. The findings demonstrate fatigue and inadequate sleep in anaesthesia trainees during night shifts in a major metropolitan teaching hospital. The data obtained may help administrators prepare safer rosters, and junior staff develop improved strategies to reduce the likelihood of fatigue.

  12. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  13. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  14. Artificial light at night alters trophic interactions of intertidal invertebrates.

    Science.gov (United States)

    Underwood, Charlotte N; Davies, Thomas W; Queirós, Ana M

    2017-07-01

    Despite being globally widespread in coastal regions, the impacts of light pollution on intertidal ecosystems has received little attention. Intertidal species exhibit many night-time-dependent ecological strategies, including feeding, reproduction, orientation and predator avoidance, which are likely negatively affected by shifting light regimes, as has been observed in terrestrial and aquatic taxa. Coastal lighting may shape intertidal communities through its influence on the nocturnal foraging activity of dogwhelks (Nucella lapillus), a widespread predatory mollusc that structures biodiversity in temperate rocky shores. In the laboratory, we investigated whether the basal and foraging activity of this predator was affected by exposure to night-time lighting both in the presence and absence of olfactory predator cues (Carcinus maenas, common shore crab). Assessments of dogwhelks' behavioural responses to night-time white LED lighting were performed on individuals that had been acclimated to night-time white LED lighting conditions for 16 days and individuals that had not previously been exposed to artificial light at night. Dogwhelks acclimated to night-time lighting exhibited natural refuge-seeking behaviour less often compared to control animals, but were more likely to respond to and handle prey irrespective of whether olfactory predator cues were present. These responses suggest night-time lighting likely increased the energetic demand of dogwhelks through stress, encouraging foraging whenever food was available, regardless of potential danger. Contrastingly, whelks not acclimated under night-time lighting were more likely to respond to the presence of prey under artificial light at night when olfactory predator cues were present, indicating an opportunistic shift towards the use of visual instead of olfactory cues in risk evaluation. These results demonstrate that artificial night-time lighting influences the behaviour of intertidal fauna such that the

  15. Night shift work and prolactin as a breast cancer risk factor

    Directory of Open Access Journals (Sweden)

    Agnieszka Bukowska

    2013-04-01

    Full Text Available Prolactin - a hormone secreted in a circadian rhythm acts as a regulator of growth and development of the mammary glands. It has been observed that working at night increases breast cancer risk in women. Night shift work, probably carcinogenic to humans (Group 2A IARC, can disrupt a circadian rhythm, and thus potentially alter the rhythm of prolactin secretion. The aim of our work was to review epidemiological evidence on the association between prolactin and the risk of breast cancer and the influence of work at night on prolactin secretion. Search was done in the Medline database by keywords (shift work, work at night, risk of breast cancer and prolactin. The increased proliferation of breast cells activated by prolactin can promote the development of cancer. The results of the largest epidemiological prospective studies suggest the association between prolactin levels and the risk of breast cancer in women. So far, only seven studies have investigated the association between work at night and prolactin secretion. In three studies lower concentrations of prolactin have been observed in night shift workers. No relationship between the night shift work duration and prolactin level in women have been reported. Night shift work can modify the profile of prolactin secretion in night workers, probably decreasing the secretion of this hormone at night. It is therefore unlikely that prolactin plays an important role in the development of breast cancer in women working at night. This conclusion is based on the results of a few epidemiological studies. Med Pr 2013;64(2:245–257

  16. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  17. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  18. Sign of the day-night asymmetry for solar neutrinos

    International Nuclear Information System (INIS)

    Chiang, Cheng-Wei; Wolfenstein, Lincoln

    2001-01-01

    A qualitative understanding of the day-night asymmetry for solar neutrinos is provided. The greater night flux in ν e is seen to be a consequence of the fact that the matter effect in the Sun and that in the Earth have the same sign. It is shown in the adiabatic approximation for the Sun and constant density for the Earth that, for all values of the mixing angle θ V between 0 and π/2, the night flux of neutrinos is greater than the day flux. Only for small values of θ V where the adiabatic approximation badly fails does the sign of the day-night asymmetry reverse

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. Deliberating about race as a variable in biomedical research | van ...

    African Journals Online (AJOL)

    Race as a variable in research ethics is investigated: to what extent is it morally appropriate to regard the race of research subjects as pivotal for research outcomes? The challenges it poses to deliberation in research ethics committees are considered, and it is concluded that race sometimes must be considered, subject to ...

  1. From the shadows into the light: How pretrial publicity and deliberation affect mock jurors' decisions, impressions, and memory.

    Science.gov (United States)

    Ruva, Christine L; Guenther, Christina C

    2015-06-01

    This 2-part study explored how exposure to negative pretrial publicity (Neg-PTP) influences the jury process, as well as possible mechanisms responsible for its biasing effects on decisions. Study Part A explored how PTP and jury deliberations affect juror/jury verdicts, memory, and impressions of the defendant and attorneys. One week before viewing a criminal trial mock-jurors (N = 320 university students) were exposed to Neg-PTP or unrelated crime stories (No-PTP). Two days later deliberating jurors came to a group decision, whereas nondeliberating jurors completed an unrelated task before making an individual decision. Neg-PTP jurors were more likely to vote guilty, make memory errors, and rate the defendant lower in credibility. Deliberation reduced Neg-PTP jurors' memory accuracy and No-PTP jurors' guilty verdicts (leniency bias). Jurors' memory and ratings of the defendant and prosecuting attorney significantly mediated the effect of PTP on guilt ratings. Study Part B content analyzed 30 mock-jury deliberations and explored how PTP influenced deliberations and ultimately jury decisions. Neg-PTP juries were more likely than No-PTP juries to discuss ambiguous trial evidence in a proprosecution manner and less likely to discuss judicial instructions and lack of evidence. All Neg-PTP juries mentioned PTP, after instructed otherwise, and rarely corrected jury members who mentioned PTP. Discussion of ambiguous trial evidence in a proprosecution manner and lack of evidence significantly mediated the effect of PTP on jury-level guilt ratings. Together the findings suggest that judicial admonishments and deliberations may not be sufficient to reduce PTP bias, because of memory errors, biased impressions, and predecisional distortion. (c) 2015 APA, all rights reserved).

  2. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  3. Passive Cooling of buildings by night-time ventilation

    DEFF Research Database (Denmark)

    Artmann, Nikolai; Manz, Heinrich; Heiselberg, Per

    coefficients below about 4 W/m2K. Heat transfer during night-time ventilation in case of mixing and displacement ventilation was investigated in a full scale test room at Aalborg University. In the experiments the temperature efficiency of the ventilation was determined. Based on the previous re-sults a method...... are still hesitant to apply passive cooling techniques. As night-time ventilation is highly dependent on climatic conditions, a method for quantifying the climatic cooling potential was developed and the impact of climate warming was investigated. Although a clear decrease was found, significant potential...... will remain, especially if night-time ventilation is applied in combination with other cooling methods. Building energy simulations showed that the performance of night-time ventilation is also affected by the heat transfer at internal room surfaces, as the cooling effect is very limited for heat transfer...

  4. Personal Characteristics of Teachers, Situational Variables and Deliberations in Planning Instruction.

    Science.gov (United States)

    Kremer, Lya

    This study reveals possible relationships among teachers' personality traits, situational variables, and deliberation characteristics in planning instruction. Dogmatism and locus of control perceptions were the personality traits studied, and the situations compared student teachers with elementary and secondary school teachers. Both groups were…

  5. Relationship of night and shift work with weight change and lifestyle behaviors.

    OpenAIRE

    Bekkers, M.B.M; Koppes, L.L.J.; Rodenburg, W.; Steeg, H. van; Proper, K.I.

    2015-01-01

    Objective: To prospectively study the association of night and shift work with weight change and lifestyle behaviors. Methods: Workers participating in the Netherlands Working Conditions Cohort Study (2008 and 2009) (N = 5951) reported night and shift work, weight and height. Groups included stable night or shift work, from day work to night or shift work, from night or shift work to day work, and no night or shift work in 2008 and 2009. Regression analyses were used to study association chan...

  6. Night eating and weight change in middle-aged men and women

    DEFF Research Database (Denmark)

    Andersen, Gregers Stig; Stunkard, Albert J.; Sørensen, Thorkild I.A.

    2004-01-01

    -94 too. Subjects working night shifts were excluded. MEASUREMENTS: Night eating in 1987-88, 5-y preceding and 6-y subsequent weight change. RESULTS: In total, 9.0% women and 7.4% men reported 'getting up at night to eat'. Obese women with night eating experienced an average 6-y weight gain of 5.2 kg (P=0...

  7. Public Deliberation as a Teaching Andragogy: Implications for Adult Student Learning from a Doctoral Higher Education Policy Course

    Science.gov (United States)

    Johnson, Matthew; Partlo, Margaret; Hullender, Tammy; Akanwa, Emmanuel; Burke, Heather; Todd, Jerry; Alwood, Christine

    2014-01-01

    Public deliberation provides an inclusive and robust mechanism for making shared decisions in community and political settings; however, its application to teaching and learning remains underutilized (McMillan & Harriger, 2007). This manuscript reports on a case study of the use of public deliberation as a teaching andragogy in a graduate…

  8. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  9. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  10. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  11. Night Shift Work and Its Health Effects on Nurses.

    Science.gov (United States)

    Books, Candie; Coody, Leon C; Kauffman, Ryan; Abraham, Sam

    The purpose of this research was to study night shift work and its health effects on nurses. This was a quantitative study using descriptive design; it also incorporated three qualitative open-ended questions to complement the study. The data were collected using Survey Monkey, with an Internet-based confidential data collection tool. The population of relevance to this study was nurses employed in hospital settings in the United States. E-mail addresses and Facebook were used to recruit participants. Results indicated that there is an increased risk of sleep deprivation, family stressors, and mood changes because of working the night shift. Rotating shifts were mentioned as a major concern for night shift nurses. Respondents agreed that complaints about fatigue and fatigue-related illnesses in night shift workers were ignored. There was also a general perception among nurses working the night shift that sleep deprivation leads to negative health consequences including obesity; however, they were not as high a concern as rotating shifts or fatigue.

  12. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  13. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  14. Relationship of night and shift work with weight change and lifestyle behaviors.

    Science.gov (United States)

    Bekkers, Marga B M; Koppes, Lando L J; Rodenburg, Wendy; van Steeg, Harry; Proper, Karin I

    2015-04-01

    To prospectively study the association of night and shift work with weight change and lifestyle behaviors. Workers participating in the Netherlands Working Conditions Cohort Study (2008 and 2009) (N = 5951) reported night and shift work, weight and height. Groups included stable night or shift work, from day work to night or shift work, from night or shift work to day work, and no night or shift work in 2008 and 2009. Regression analyses were used to study association changes in night and shift work with weight change and changes in lifestyle behaviors. A larger weight change was seen in normal-weight workers changing from day to shift work (β = 0.93%; 95% confidence interval, 0.01 to 1.85) compared with stable no shift workers. No further associations of night and shift work with weight change were observed, neither in normal-weight, overweight, and obese workers. Despite the fact that starting night or shift work is associated with some unhealthy lifestyle habits, this study did not confirm a positive association of night and shift work with weight change over 1 year, except for normal-weight workers moving from day to shift work.

  15. Nonelective surgery at night and in-hospital mortality

    DEFF Research Database (Denmark)

    van Zaane, Bas; van Klei, Wilton A; Buhre, Wolfgang F

    2015-01-01

    BACKGROUND: Evidence suggests that sleep deprivation associated with night-time working may adversely affect performance resulting in a reduction in the safety of surgery and anaesthesia. OBJECTIVE: Our primary objective was to evaluate an association between nonelective night-time surgery and in...

  16. Increased and mistimed sex hormone production in night shift workers.

    Science.gov (United States)

    Papantoniou, Kyriaki; Pozo, Oscar J; Espinosa, Ana; Marcos, Josep; Castaño-Vinyals, Gemma; Basagaña, Xavier; Juanola Pagès, Elena; Mirabent, Joan; Martín, Jordi; Such Faro, Patricia; Gascó Aparici, Amparo; Middleton, Benita; Skene, Debra J; Kogevinas, Manolis

    2015-05-01

    Night shift work has been associated with an increased risk for breast and prostate cancer. The effect of circadian disruption on sex steroid production is a possible underlying mechanism, underinvestigated in humans. We have assessed daily rhythms of sex hormones and melatonin in night and day shift workers of both sexes. We recruited 75 night and 42 day workers, ages 22 to 64 years, in different working settings. Participants collected urine samples from all voids over 24 hours on a working day. Urinary concentrations of 16 sex steroid hormones and metabolites (estrogens, progestagens, and androgens) and 6-sulfatoxymelatonin were measured in all samples. Mean levels and peak time of total and individual metabolite production were compared between night and day workers. Night workers had higher levels of total progestagens [geometric mean ratio (GMR) 1.65; 95% confidence intervals (CI), 1.17-2.32] and androgens (GMR: 1.44; 95% CI, 1.03-2.00), compared with day workers, after adjusting for potential confounders. The increased sex hormone levels among night shift workers were not related to the observed suppression of 6-sulfatoxymelatonin. Peak time of androgens was significantly later among night workers, compared with day workers (testosterone: 12:14 hours; 10:06-14:48 vs. 08:35 hours; 06:52-10:46). We found increased levels of progestagens and androgens as well as delayed peak androgen production in night shift workers compared with day workers. The increase and mistiming of sex hormone production may explain part of the increased risk for hormone-related cancers observed in night shift workers. ©2015 American Association for Cancer Research.

  17. Students' educational experiences and interaction with residents on night shifts.

    Science.gov (United States)

    Schiller, Jocelyn; Sokoloff, Max; Tendhar, Chosang; Schmidt, John; Christner, Jennifer

    2017-08-01

    The purpose of this mixed-methods study was to investigate whether increased night shifts for students on paediatric rotations had any negative impact on their overall quality of educational experiences in light of the implementation of duty-hour restrictions. Both quantitative and qualitative data were collected from 30 students on paediatric rotations during the academic year 2011/12. Students completed two questionnaires, one in response to their experiences during the day shifts and another in response to their experiences during the night shifts. Only 25 cases were retained for the final analyses. The non-parametric Wilcoxon signed-rank test was used to analyse the quantitative data, and constant comparative thematic analyses, as described by Creswell, were used to analyse the qualitative data. [Do] increased nights shifts for students … [have] any negative impact on their overall quality of educational experiences[?] RESULTS: The results indicated that students' perceived quality of experiences during the night shifts was greater, compared with their day shifts. Students reported having more time to socialise during the night shifts. They further reported that informal ways of learning, such as impromptu teaching and spontaneous discussions on clinical problems, were more beneficial, and these often occurred in abundance during the night shifts as opposed to the scheduled didactic teaching sessions that occur during the day shifts. This study documented many unanticipated benefits of night shifts. The feeling of cohesiveness of the night team deserves further exploration, as this can be linked to better performance outcomes. More consideration should be given to implementing night shifts as a regular feature of clerkships. © 2016 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  18. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  19. Measured energy savings from using night temperature setback

    International Nuclear Information System (INIS)

    Szydlowski, R.F.; Wrench, L.E.; O'Neill, P.J.

    1993-01-01

    The measured energy savings resulting from using night temperature setback in typical light-construction wooden office buildings was determined. Researchers installed monitoring equipment in a six-building sample of two-story wooden buildings at Fort Devens, Massachusetts. Data obtained during both single-setting and night-setback operating modes were used to develop models of each building's heat consumption as a function of the difference between inside and outside temperature. These models were used to estimate seasonal savings that could be obtained from the use of night-setback thermostat control. The measured savings in heating energy from using night temperature setback for the six Fort Devens buildings ranged from 14% to 25%; the mean savings was 19.2%. Based on an energy cost of $0.65/therm of natural gas, the estimated average cost savings of using automatic setback thermostats in these buildings is $780 per year per building

  20. Occupational history of night shift work and Parkinson's disease in Denmark

    DEFF Research Database (Denmark)

    Schernhammer, Eva S; Lassen, Christina F; Kenborg, Line

    2015-01-01

    OBJECTIVES: We investigated whether working night shifts was associated with the risk of Parkinson's disease (PD). METHODS: Between January 2008 and December 2010, we recruited 1808 patients with a confirmed diagnosis of idiopathic PD from Denmark and 1876 population controls matched by year...... shift work and PD [odds ratio (OR) for any type of night work (ie, either permanent or rotating night work) 1.01, 95% confidence interval (95% CI) 0.86-1.21]. Compared with persons who never worked night shifts, risks of those with longer durations of night work did not appear to differ (OR ....95, 95% CI 0.75-1.19, OR 10-19 years= 1.09, 95% CI 0.77-1.53, OR ≥20 years=1.05, 95% CI 0.81-1.37, P for trend=0.23). Associations were similar among men and women. CONCLUSIONS: These data suggest that working night shifts is not associated with PD or that low tolerance for night shift work is an early...

  1. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Occupational history of night shift work and Parkinson's disease in Denmark.

    Science.gov (United States)

    Schernhammer, Eva S; Lassen, Christina F; Kenborg, Line; Ritz, Beate; Olsen, Jørgen H; Hansen, Johnni

    2015-07-01

    We investigated whether working night shifts was associated with the risk of Parkinson's disease (PD). Between January 2008 and December 2010, we recruited 1808 patients with a confirmed diagnosis of idiopathic PD from Denmark and 1876 population controls matched by year of birth and gender. Information on lifelong occupational history, including information on night work, smoking, caffeine and alcohol consumption habits, and family history of PD was collected through structured telephone interviews. Overall, there was no association between a history of night shift work and PD [odds ratio (OR) for any type of night work (ie, either permanent or rotating night work) 1.01, 95% confidence interval (95% CI) 0.86-1.21]. Compared with persons who never worked night shifts, risks of those with longer durations of night work did not appear to differ (OR <10 years=0.95, 95% CI 0.75-1.19, OR 10-19 years= 1.09, 95% CI 0.77-1.53, OR ≥20 years=1.05, 95% CI 0.81-1.37, P for trend=0.23). Associations were similar among men and women. These data suggest that working night shifts is not associated with PD or that low tolerance for night shift work is an early marker of PD. Due to the novel and exploratory nature of these findings, confirmation is needed.

  4. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  5. Childhood night terrors and sleepwalking: diagnosis and treatment

    Directory of Open Access Journals (Sweden)

    Sachin Ratan Gedam

    2017-12-01

    Full Text Available Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to highlight the importance of diagnosis and treatment in this condition. To conclude, all medical professionals need to be aware of different parasomnias and its treatment options.

  6. A night sky model.

    Science.gov (United States)

    Erpylev, N. P.; Smirnov, M. A.; Bagrov, A. V.

    A night sky model is proposed. It includes different components of light polution, such as solar twilight, moon scattered light, zodiacal light, Milky Way, air glow and artificial light pollution. The model is designed for calculating the efficiency of astronomical installations.

  7. Light at Night Markup Language (LANML): XML Technology for Light at Night Monitoring Data

    Science.gov (United States)

    Craine, B. L.; Craine, E. R.; Craine, E. M.; Crawford, D. L.

    2013-05-01

    Light at Night Markup Language (LANML) is a standard, based upon XML, useful in acquiring, validating, transporting, archiving and analyzing multi-dimensional light at night (LAN) datasets of any size. The LANML standard can accommodate a variety of measurement scenarios including single spot measures, static time-series, web based monitoring networks, mobile measurements, and airborne measurements. LANML is human-readable, machine-readable, and does not require a dedicated parser. In addition LANML is flexible; ensuring future extensions of the format will remain backward compatible with analysis software. The XML technology is at the heart of communicating over the internet and can be equally useful at the desktop level, making this standard particularly attractive for web based applications, educational outreach and efficient collaboration between research groups.

  8. Evolution of the ATLAS Nightly Build System

    International Nuclear Information System (INIS)

    Undrus, A

    2012-01-01

    The ATLAS Nightly Build System is a major component in the ATLAS collaborative software organization, validation, and code approval scheme. For over 10 years of development it has evolved into a factory for automatic release production and grid distribution. The 50 multi-platform branches of ATLAS releases provide vast opportunities for testing new packages, verification of patches to existing software, and migration to new platforms and compilers for ATLAS code that currently contains 2200 packages with 4 million C++ and 1.4 million python scripting lines written by about 1000 developers. Recent development was focused on the integration of ATLAS Nightly Build and Installation systems. The nightly releases are distributed and validated and some are transformed into stable releases used for data processing worldwide. The ATLAS Nightly System is managed by the NICOS control tool on a computing farm with 50 powerful multiprocessor nodes. NICOS provides the fully automated framework for the release builds, testing, and creation of distribution kits. The ATN testing framework of the Nightly System runs unit and integration tests in parallel suites, fully utilizing the resources of multi-core machines, and provides the first results even before compilations complete. The NICOS error detection system is based on several techniques and classifies the compilation and test errors according to their severity. It is periodically tuned to place greater emphasis on certain software defects by highlighting the problems on NICOS web pages and sending automatic e-mail notifications to responsible developers. These and other recent developments will be presented and future plans will be described.

  9. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  10. To Think or Not to Think:The Effect of Cognitive Deliberation on the Influence of Injunctive Versus Descriptive Social Norms

    NARCIS (Netherlands)

    Melnyk, V.; Herpen, van E.; Fischer, A.R.H.; Trijp, van H.C.M.

    2011-01-01

    Consumers can process information containing social norms at different cognitive deliberation levels. This paper investigates the effect of cognitive deliberation for both descriptive and injunctive norms. The experimental study examines the consequences for attitudes and behavioral intentions of

  11. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  12. Light at Night and Breast Cancer Risk Among California Teachers

    Science.gov (United States)

    Hurley, Susan; Goldberg, Debbie; Nelson, David; Hertz, Andrew; Horn-Ross, Pamela L.; Bernstein, Leslie; Reynolds, Peggy

    2014-01-01

    Background There is convincing evidence that circadian disruption mediated by exposure to light at night promotes mammary carcinogenesis in rodents. The role that light at night plays in human breast cancer etiology remains unknown. We evaluated the relationship between estimates of indoor and outdoor light at night and the risk of breast cancer among members of the California Teachers Study. Methods Indoor light-at-night estimates were based on questionnaire data regarding sleep habits and use of night time lighting while sleeping. Estimates of outdoor light at night were derived from imagery data obtained from the U.S. Defense Meteorological Satellite Program assigned to geocoded addresses of study participants. Analyses were conducted among 106,731 California Teachers Study members who lived in California, had no prior history of breast cancer, and provided information on lighting while sleeping. 5,095 cases of invasive breast cancer diagnosed 1995–2010 were identified via linkage to the California Cancer Registry. We used age-stratified Cox proportional hazard models to calculate hazard ratios (HRs) with 95% confidence intervals (CIs), adjusting for breast cancer risk factors and neighborhood urbanization and socioeconomic class. Results An increased risk was found for women living in areas with the highest quintile of outdoor light at night exposure estimates (HR=1.12 [95% CI=1.00 – 1.26], test for trend, P=0.06). While more pronounced among premenopausal women (HR=1.34 [95% CI=1.07 – 1.69], test for trend, P=0.04), the associations did not differ statistically by menopausal status (test for interaction, P=0.34). Conclusions Women living in areas with high levels of ambient light at night may be at an increased risk of breast cancer. Future studies that integrate quantitative measurements of indoor and outdoor light at night are warranted. PMID:25061924

  13. Sleep and recovery in physicians on night call: a longitudinal field study

    Directory of Open Access Journals (Sweden)

    Malmberg Birgitta

    2010-08-01

    Full Text Available Abstract Background It is well known that physicians' night-call duty may cause impaired performance and adverse effects on subjective health, but there is limited knowledge about effects on sleep duration and recovery time. In recent years occupational stress and impaired well-being among anaesthesiologists have been frequently reported for in the scientific literature. Given their main focus on handling patients with life-threatening conditions, when on call, one might expect sleep and recovery to be negatively affected by work, especially in this specialist group. The aim of the present study was to examine whether a 16-hour night-call schedule allowed for sufficient recovery in anaesthesiologists compared with other physician specialists handling less life-threatening conditions, when on call. Methods Sleep, monitored by actigraphy and Karolinska Sleep Diary/Sleepiness Scale on one night after daytime work, one night call, the following first and second nights post-call, and a Saturday night, was compared between 15 anaesthesiologists and 17 paediatricians and ear, nose, and throat surgeons. Results Recovery patterns over the days after night call did not differ between groups, but between days. Mean night sleep for all physicians was 3 hours when on call, 7 h both nights post-call and Saturday, and 6 h after daytime work (p Conclusions Despite considerable sleep loss during work on night call, and unexpectedly short sleep after ordinary day work, the physicians' self-reports indicate full recovery after two nights' sleep. We conclude that these 16-hour night duties were compatible with a short-term recovery in both physician groups, but the limited sleep duration in general still implies a long-term health concern. These results may contribute to the establishment of safe working hours for night-call duty in physicians and other health-care workers.

  14. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  15. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  16. Managers' views on and experiences with moral case deliberation in nursing teams

    NARCIS (Netherlands)

    Weidema, F.C.; Molewijk, A.C.; Kamsteeg, F.; Widdershoven, G.A.M.

    2015-01-01

    Aims: Providing management insights regarding moral case deliberation (MCD) from the experiential perspective of nursing managers. Background: MCD concerns systematic group-wise reflection on ethical issues. Attention to implementing MCD in health care is increasing, and managers' experiences

  17. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  18. The effects of hot nights on mortality in Barcelona, Spain

    Science.gov (United States)

    Royé, D.

    2017-12-01

    Heat-related effects on mortality have been widely analyzed using maximum and minimum temperatures as exposure variables. Nevertheless, the main focus is usually on the former with the minimum temperature being limited in use as far as human health effects are concerned. Therefore, new thermal indices were used in this research to describe the duration of night hours with air temperatures higher than the 95% percentile of the minimum temperature (hot night hours) and intensity as the summation of these air temperatures in degrees (hot night degrees). An exposure-response relationship between mortality due to natural, respiratory, and cardiovascular causes and summer night temperatures was assessed using data from the Barcelona region between 2003 and 2013. The non-linear relationship between the exposure and response variables was modeled using a distributed lag non-linear model. The estimated associations for both exposure variables and mortality shows a relationship with high and medium values that persist significantly up to a lag of 1-2 days. In mortality due to natural causes, an increase of 1.1% per 10% (CI95% 0.6-1.5) for hot night hours and 5.8% per each 10° (CI95% 3.5-8.2%) for hot night degrees is observed. The effects of hot night hours reach their maximum with 100% and lead to an increase by 9.2% (CI95% 5.3-13.1%). The hourly description of night heat effects reduced to a single indicator in duration and intensity is a new approach and shows a different perspective and significant heat-related effects on human health.

  19. INVIS : Integrated night vision surveillance and observation system

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.; Dijk, J.; Son, R. van

    2010-01-01

    We present the design and first field trial results of the all-day all-weather INVIS Integrated Night Vision surveillance and observation System. The INVIS augments a dynamic three-band false-color nightvision image with synthetic 3D imagery in a real-time display. The night vision sensor suite

  20. Deliberations of working group 3: stakeholders and the public: who are they?

    International Nuclear Information System (INIS)

    Webster, S.

    2000-01-01

    The working-group deliberations opened with a general discussion centred primarily around the issues introduced in the two papers presented that morning in plenary session: 'Who Are Stakeholders in Environmental Risk Decisions?' and 'Participation of Stakeholders in Waste Management Decisions: The German Experience'. In general, the interventions by the group were open and frank and adequately covered the key issues of the subject. This was followed by a presentation on the views and experience of the current siting debate in Sweden from the perspective of the regulatory bodies and a brief summary by the Chairman of the definition of the public in EU legislation and International Conventions. The majority of the working-group members contributed actively to the debate, and the discussions were conducted in an informal and open-minded manner. Hereinafter are the main observations made during the working group deliberations. (author)

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  2. Dim Light at Night Increases Body Mass of Female Mice

    OpenAIRE

    Aubrecht, Taryn G.; Jenkins, Richelle; Nelson, Randy J.

    2014-01-01

    During the past century the prevalence of light at night has increased in parallel with obesity rates. Dim light at night (dLAN) increases body mass in male mice. However, the effects of light at night on female body mass remain unspecified. Thus, female mice were exposed to a standard light/dark (LD; 16h light at ~150 lux/8h dark at ~0 lux) cycle or to light/dim light at night (dLAN; 16h light at ~150 lux/8h dim light at ~5 lux) cycles for six weeks. Females exposed to dLAN increased the rat...

  3. Night work and BMI: is it related to on-shift napping?

    Science.gov (United States)

    Silva-Costa, Aline; Griep, Rosane Härter; Rotenberg, Lúcia

    2017-11-17

    On-shift napping can benefit night workers regarding sleep loss, synchronization of circadian rhythms, and alertness. However, few studies on napping can be found in the literature focused on possible health benefits. This cross-sectional study has investigated the role of on-shift napping on the association between night work and BMI in 409 night-shift nursing professionals. The number of working nights and the years of exposure to night work were significantly associated with increased BMI levels among non-nappers, but not among nappers. Results suggest a benefit of napping for weight gain, thus subsidizing occupational health policies on the regulation of on-shift napping among nursing workers.

  4. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  5. Twelfth night of 1917 and the Moscow art theatre Twelfth night of 1917 and the Moscow art theatre

    Directory of Open Access Journals (Sweden)

    Arkady Ostrovsky

    2008-04-01

    Full Text Available On 15 September, 1917, in a letter to Nemirovich-Danchenko, Stanislavsky renounced the stage of the Moscow Art Theatre: I cannot think about any other roles, because I will never be able to do anything, at least in the Moscow Art Theatre. Maybe in some other area or some other place I will be able to rise. Of course I do not mean in other theatres, but in the studios. Othello — free!...1 After the tragedy Stanislavsky had endured with Selo Stepanchikovo, he threw himself into Studio work. He started rehearsing Twelfth Night, a play he had put on at the Society of Art and Literature in 1897. The Studio production of Twelfth Night was played on 25 December 1917, two months to the day after the Revolution. A few months later, Nikolai Efros published a book about the First Studio. It was dedicated to The Cricket on the Hearth but the words Efros used to describe the atmosphere in which Dickens’s production had opened were equally suitable for Twelfth Night: ‘You remember what sort of days those were? On 15 September, 1917, in a letter to Nemirovich-Danchenko, Stanislavsky renounced the stage of the Moscow Art Theatre: I cannot think about any other roles, because I will never be able to do anything, at least in the Moscow Art Theatre. Maybe in some other area or some other place I will be able to rise. Of course I do not mean in other theatres, but in the studios. Othello — free!...1 After the tragedy Stanislavsky had endured with Selo Stepanchikovo, he threw himself into Studio work. He started rehearsing Twelfth Night, a play he had put on at the Society of Art and Literature in 1897. The Studio production of Twelfth Night was played on 25 December 1917, two months to the day after the Revolution. A few months later, Nikolai Efros published a book about the First Studio. It was dedicated to The Cricket on the Hearth but the words Efros used to describe the atmosphere in which Dickens’s production had opened

  6. Air Force Leadership Study: The Need for Deliberate Development

    Science.gov (United States)

    2012-02-01

    Abraham Maslow , once the basic needs of survival and security are met, people concern themselves with higher needs like affection, be- longing, the...maintaining the data needed , and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of...Study: The Need for Deliberate Development 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  7. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  8. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  9. Cooling of the Building Structure by Night-time Ventilation

    DEFF Research Database (Denmark)

    Artmann, Nikolai

    In modern, extensively glazed office buildings, due to high solar and internal loads and increased comfort expectations, air conditioning is increasingly applied even in moderate and cold climates, like in Central and Northern Europe. Particularly in these cases, night-time ventilation is often......, without considering any building-specific parameters. A method for quantifying the climatic cooling potential (CCP) was developed based on degree-hours of the difference between building and external air temperature. Applying this method to climatic data of 259 stations shows very high night cooling...... potential over the whole of Northern Europe and still significant potential in Central, Eastern and even some regions of Southern Europe. However, due to the inherent stochastic properties of weather patterns, series of warmer nights can occur at some locations, where passive cooling by night...

  10. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  11. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  12. The Cognitive-Miser Response Model: Testing for Intuitive and Deliberate Reasoning

    Science.gov (United States)

    Bockenholt, Ulf

    2012-01-01

    In a number of psychological studies, answers to reasoning vignettes have been shown to result from both intuitive and deliberate response processes. This paper utilizes a psychometric model to separate these two response tendencies. An experimental application shows that the proposed model facilitates the analysis of dual-process item responses…

  13. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  14. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  15. Is global warming mostly at night?

    International Nuclear Information System (INIS)

    Kukla, G.; Quayle, R.G.; Karl, T.

    1994-01-01

    The release of greenhouse gases is expected to lead to substantial future warming. The global mean temperature has indeed risen in recent decades. The causes of the observed warming, and its relation to the greenhouse gas buildup are, however, still debated. One important aspect of the observed temperature change relates to its asymmetry during the day and night. The day-night temperature difference over land in North America, most of Eurasia, Oceania, and portions of Africa and Australia shows a decrease since about 1950. The changes of the daily mean temperature in these areas are principally due to the rising night or early morning temperature, and are accompanied by increasing cloudiness. Their results support the notion that the increase of cloud cover, possibly due to industrial sulfur emissions, mitigates the greenhouse warming. The causes of the changing diurnal temperature range and of the increasing cloudiness will have to be clarified and the future SO 2 emissions reliably projected before any trustworthy prediction of future climates can be made. 37 refs., 7 figs., 2 tabs

  16. Persepsi Wisatawan Terhadap Night Life Attraction

    Directory of Open Access Journals (Sweden)

    Hary Hermawan

    2017-04-01

    ABSTRACT Cabaret is a term performances of music, comedy, dance, drama, and other special mix of art perfomed by men who dressed in women (ladyboy on stage. Cabaret performances in Oyot Godhong Restaurant intended as new tourist attraction that is expected to increase the interest of tourists to visit Malioboro in Yogyakarta, especially to Oyot Godhong Restaurants. Based descriptive study shows that the characteristics travelers who viewed Kabaret show is very diverse, each of which has perceptions and motivations are different. Cabaret performances have qualified to become the cultural attractions are staged at night (night atraction in the city of Yogyakarta. Based on traveler perception indicates that the cabaret performances have beauty or aesthetics, uniqueness, and values that match the criteria criteria of the standard as a tourist attraction. Performances Cabaret in Oyot Godhong Restaurants able to increase the sale value. Oyot Godhong Restaurants previously only form of tourism facilities (amenities, but is now a restaurant that has a tourist attraction (atraction.   Keywords: Cabaret show, night life attractions, tourism attraction, tourists perception, tourism marketing

  17. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  19. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Do Wild Great Tits Avoid Exposure to Light at Night?

    Directory of Open Access Journals (Sweden)

    Maaike de Jong

    Full Text Available Studies of wild populations have provided important insights into the effects of artificial light at night on organisms, populations and ecosystems. However, in most studies the exact amount of light at night individuals are exposed to remains unknown. Individuals can potentially control their nighttime light exposure by seeking dark spots within illuminated areas. This uncertainty makes it difficult to attribute effects to a direct effect of light at night, or to indirect effects, e.g., via an effect of light at night on food availability. In this study, we aim to quantify the nocturnal light exposure of wild birds in a previously dark forest-edge habitat, experimentally illuminated with three different colors of street lighting, in comparison to a dark control. During two consecutive breeding seasons, we deployed male great tits (Parus major with a light logger measuring light intensity every five minutes over a 24h period. We found that three males from pairs breeding in brightly illuminated nest boxes close to green and red lamp posts, were not exposed to more artificial light at night than males from pairs breeding further away. This suggests, based on our limited sample size, that these males could have been avoiding light at night by choosing a roosting place with a reduced light intensity. Therefore, effects of light at night previously reported for this species in our experimental set-up might be indirect. In contrast to urban areas where light is omnipresent, bird species in non-urban areas may evade exposure to nocturnal artificial light, thereby avoiding direct consequences of light at night.

  1. Night work and BMI: is it related to on-shift napping?

    Directory of Open Access Journals (Sweden)

    Aline Silva-Costa

    2017-11-01

    Full Text Available ABSTRACT On-shift napping can benefit night workers regarding sleep loss, synchronization of circadian rhythms, and alertness. However, few studies on napping can be found in the literature focused on possible health benefits. This cross-sectional study has investigated the role of on-shift napping on the association between night work and BMI in 409 night-shift nursing professionals. The number of working nights and the years of exposure to night work were significantly associated with increased BMI levels among non-nappers, but not among nappers. Results suggest a benefit of napping for weight gain, thus subsidizing occupational health policies on the regulation of on-shift napping among nursing workers.

  2. A comparative study of night-time enhancement of TEC at a low latitude station on storm and quiet nights including the local time, seasonal and solar activity dependence

    Directory of Open Access Journals (Sweden)

    K. Unnikrishnan

    Full Text Available The main characteristics of night-time enhancements in TEC during magnetic storms are compared with those during quiet nights for different seasons and solar activity conditions at Palehua, a low latitude station during the period 1980–1989. We find that the mean amplitude has both a seasonal and solar activity dependence: in winter, the values are higher for weak storms as compared to those during quiet nights and increase with an increase in solar activity. In summer, the mean amplitude values during weak storms and quiet nights are almost equal. But during equinox, the mean amplitude values for quiet nights are greater than those during weak storms. The mean half-amplitude duration is higher during weak storms as compared to that during quiet nights in summer. However, during winter and equinox, the durations are almost equal for both quiet and weak storm nights. For the mean half-amplitude duration, the quiet night values for all the seasons and equinoctial weak storm values increase with an increase in solar activity. The occurrence frequency (in percent of TEC enhancement during weak storms is greater than during quiet nights for all seasons. The mean amplitude, the mean half-amplitude duration and the occurrence frequency (in percent of TEC enhancement values are higher during major storms as compared to those during quiet nights. The above parameters have their highest values during pre-midnight hours. From the data analysed, this behaviour is true in the case of major storms also.

    Key words. Ionosphere (ionospheric disturbances; plasma convection Magnetospheric physics (storms and substorms

  3. Deconstructing alcohol use on a night out in England: promotions, preloading and consumption.

    Science.gov (United States)

    McClatchley, Kirstie; Shorter, Gillian W; Chalmers, Jenny

    2014-07-01

    To examine alcohol consumed during a drinking event (a single drinking occasion) by those attending public house/on-trade establishments on nights with standard pricing and nights with promotional prices. Data (n = 425) were collected in an ecological momentary assessment over eight nights in two locations (Midlands and London) on both promotional and standard (Saturday) nights. Multiple regression was used to predict event alcohol consumption by sex, age, type of night, alcohol preloading behaviour, marital and employment status, education, Alcohol Use Disorders Identification Test alcohol consumption questions separately or total AUDIT-C and social group size. Mean (UK) units consumed were 11.8 (London) and 14.4 (Midlands). In London, consumption was similar on promotional and standard nights, but in the Midlands, standard night consumption was three units higher. Preloading was reported by 30%; more common on standard nights. Regression analyses revealed being male, preloading and past-year total AUDIT-C were associated with higher event consumption. However, when AUDIT-C questions were added separately, being a standard night was associated with increased event consumption and different AUDIT-C questions were significantly associated with event consumption in each location. Event consumption reflected heavy episodic drinking and was influenced by price. Promotional night consumption either matched standard Saturday night consumption or was slightly lower. In London, there was a significant preference for drinking at least one promotional beverage on promotional nights. On standard nights, consumption was over a wider range of venues, and preloading with off-trade alcohol was more likely. © 2014 Australasian Professional Society on Alcohol and other Drugs.

  4. Motive Matters! An exploration of the notion ‘deliberate breach of contract’ and its consequences for the application of remedies

    NARCIS (Netherlands)

    M. van Kogelenberg (Martijn)

    2012-01-01

    textabstractThis thesis explores the notion of deliberate breach of contract and its potential remedial consequences. In the major jurisdictions in Europe and in the United States the notion of deliberate breach of contract is generally not coherently and officially defined and acknowledged as an

  5. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  6. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  7. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  8. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  9. Night eating among veterans with obesity.

    Science.gov (United States)

    Dorflinger, Lindsey M; Ruser, Christopher B; Masheb, Robin M

    2017-10-01

    The obesity rate is higher among veterans than the general population, yet few studies have examined their eating behaviors, and none have examined the presence of night eating and related comorbidities. This study examines night eating syndrome (NES) among veterans seeking weight management treatment, and relationships between NES and weight, insomnia, disordered eating, and psychological variables. The sample consisted of 110 veterans referred to a weight management program at VA Connecticut Healthcare System. More than one out of ten veterans screened positive for NES, and one-third screened positive for insomnia. Most individuals screening positive for NES also screened positive for insomnia. Night eating was associated with higher BMI, and with higher scores on measures of binge eating, emotional overeating, and eating disorder symptomatology. Veterans screening positive for NES were also significantly more likely to screen positive for depression and PTSD. When controlling for insomnia, only the relationships between night eating and binge and emotional eating remained significant. Those screening positive for PTSD were more likely to endorse needing to eat to return to sleep. Findings suggest that both NES and insomnia are common among veterans seeking weight management services, and that NES is a marker for additional disordered eating behavior, specifically binge eating and overeating in response to emotions. Additional studies are needed to further delineate the relationships among NES, insomnia, and psychological variables, as well as to examine whether specifically addressing NES within behavioral weight management interventions can improve weight outcomes and problematic eating behaviors. Published by Elsevier Ltd.

  10. "Twelfth Night" for Kids.

    Science.gov (United States)

    Burdett, Lois; Coburn, Christine

    Aimed at primary-age children, this book brings William Shakespeare's "Twelfth Night" to them, recognizing that children, properly guided, will take to Shakespeare's characters and stories like "ducks to water"; in the process they find their inner voices, they collaborate, they improvise, and they communicate. Illustrated with…

  11. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  12. Delivery outcomes after day and night onset of labour.

    Science.gov (United States)

    Kanwar, Sandeep; Rabindran, Ranjit; Lindow, Stephen W

    2015-11-01

    To describe the outcome of night onset of labour as compared with the day onset of labour to investigate if labour that begins at night is more efficient. Retrospective review of labour and delivery data. A large United Kingdom maternity service. Over the period of 10 years, there were 30,022 deliveries, of which 19,842 were studied. A United Kingdom maternity department database was used to identify deliveries over a 10-year period, and the delivery outcomes were retrieved from these records. The 19,842 labours were divided into two categories: night onset (22.00-06.00 h) and day onset (10.00-18.00 h). Rates of operative intervention, augmentation, epidural usage and labour duration. A significant difference in delivery outcome was noted (P=0.004) with the night-onset labours having more normal deliveries (83.6% vs. 82.5%), fewer caesarean sections (8.7% vs. 10.1%), fewer labour augmentations with syntocinon (14.9% vs. 19.5%, Pnight-onset group and 2414 (30%) in the day-onset group (χ2=1.3, P=NS) Conclusions: Labours that start at night appear to be more efficient than labours that start during the day.

  13. Prevalence and characteristics of moral case deliberation in Dutch health care

    NARCIS (Netherlands)

    Dauwerse, L.; Stolper, M.M.; Widdershoven, G.; Molewijk, A.C.

    2014-01-01

    The attention for Moral case deliberation (MCD) has increased over the past years. Previous research on MCD is often written from the perspective of MCD experts or MCD participants and we lack a more distant view to the role of MCD in Dutch health care institutions in general. The purpose of this

  14. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  15. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  16. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  17. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  18. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  19. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  20. Deliverance from the "Dark Night of the Soul"

    Science.gov (United States)

    Kinnier, Richard T.; Dixon, Andrea L.; Scheidegger, Corey; Lindberg, Brent

    2009-01-01

    For many individuals, spiritual inspiration, clarity, or epiphany is often preceded by a "dark night of the soul". St. John of the Cross, a Spanish mystic of the 16th century, first described the concept. Today, the phrase "dark night of the soul" is usually associated with the crisis part of the journey to enlightenment. This article defines and…

  1. Outcomes of moral case deliberation--the development of an evaluation instrument for clinical ethics support (the Euro-MCD).

    Science.gov (United States)

    Svantesson, Mia; Karlsson, Jan; Boitte, Pierre; Schildman, Jan; Dauwerse, Linda; Widdershoven, Guy; Pedersen, Reidar; Huisman, Martijn; Molewijk, Bert

    2014-04-08

    Clinical ethics support, in particular Moral Case Deliberation, aims to support health care providers to manage ethically difficult situations. However, there is a lack of evaluation instruments regarding outcomes of clinical ethics support in general and regarding Moral Case Deliberation (MCD) in particular. There also is a lack of clarity and consensuses regarding which MCD outcomes are beneficial. In addition, MCD outcomes might be context-sensitive. Against this background, there is a need for a standardised but flexible outcome evaluation instrument. The aim of this study was to develop a multi-contextual evaluation instrument measuring health care providers' experiences and perceived importance of outcomes of Moral Case Deliberation. A multi-item instrument for assessing outcomes of Moral Case Deliberation (MCD) was constructed through an iterative process, founded on a literature review and modified through a multistep review by ethicists and health care providers. The instrument measures perceived importance of outcomes before and after MCD, as well as experienced outcomes during MCD and in daily work. A purposeful sample of 86 European participants contributed to a Delphi panel and content validity testing. The Delphi panel (n = 13), consisting of ethicists and ethics researchers, participated in three Delphi-rounds. Health care providers (n = 73) participated in the content validity testing through 'think-aloud' interviews and a method using Content Validity Index. The development process resulted in the European Moral Case Deliberation Outcomes Instrument (Euro-MCD), which consists of two sections, one to be completed before a participant's first MCD and the other after completing multiple MCDs. The instrument contains a few open-ended questions and 26 specific items with a corresponding rating/response scale representing various MCD outcomes. The items were categorised into the following six domains: Enhanced emotional support, Enhanced

  2. Outcomes of Moral Case Deliberation - the development of an evaluation instrument for clinical ethics support (the Euro-MCD)

    Science.gov (United States)

    2014-01-01

    Background Clinical ethics support, in particular Moral Case Deliberation, aims to support health care providers to manage ethically difficult situations. However, there is a lack of evaluation instruments regarding outcomes of clinical ethics support in general and regarding Moral Case Deliberation (MCD) in particular. There also is a lack of clarity and consensuses regarding which MCD outcomes are beneficial. In addition, MCD outcomes might be context-sensitive. Against this background, there is a need for a standardised but flexible outcome evaluation instrument. The aim of this study was to develop a multi-contextual evaluation instrument measuring health care providers’ experiences and perceived importance of outcomes of Moral Case Deliberation. Methods A multi-item instrument for assessing outcomes of Moral Case Deliberation (MCD) was constructed through an iterative process, founded on a literature review and modified through a multistep review by ethicists and health care providers. The instrument measures perceived importance of outcomes before and after MCD, as well as experienced outcomes during MCD and in daily work. A purposeful sample of 86 European participants contributed to a Delphi panel and content validity testing. The Delphi panel (n = 13), consisting of ethicists and ethics researchers, participated in three Delphi-rounds. Health care providers (n = 73) participated in the content validity testing through ‘think-aloud’ interviews and a method using Content Validity Index. Results The development process resulted in the European Moral Case Deliberation Outcomes Instrument (Euro-MCD), which consists of two sections, one to be completed before a participant’s first MCD and the other after completing multiple MCDs. The instrument contains a few open-ended questions and 26 specific items with a corresponding rating/response scale representing various MCD outcomes. The items were categorised into the following six domains: Enhanced

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  4. Automatic and deliberate affective associations with sexual stimuli in women with lifelong vaginismus before and after therapist-aided exposure treatment.

    Science.gov (United States)

    Melles, Reinhilde J; ter Kuile, Moniek M; Dewitte, Marieke; van Lankveld, Jacques J D M; Brauer, Marieke; de Jong, Peter J

    2014-03-01

    The intense fear response to vaginal penetration in women with lifelong vaginismus, who have never been able to experience coitus, may reflect negative automatic and deliberate appraisals of vaginal penetration stimuli which might be modified by exposure treatment. The aim of this study is to examine whether (i) sexual stimuli elicit relatively strong automatic and deliberate threat associations in women with vaginismus, as well as relatively negative automatic and deliberate global affective associations, compared with symptom-free women; and (ii) these automatic and more deliberate attitudes can be modified by therapist-aided exposure treatment. A single target Implicit Association Test (st-IAT) was used to index automatic threat associations, and an Affective Simon Task (AST) to index global automatic affective associations. Participants were women with lifelong vaginismus (N = 68) and women without sexual problems (N = 70). The vaginismus group was randomly allocated to treatment (n = 34) and a waiting list control condition (n = 34). Indices of automatic threat were obtained by the st-IAT and automatic global affective associations by the AST, visual analogue scales (VAS) were used to assess deliberate appraisals of the sexual pictures (fear and global positive affect). More deliberate fear and less global positive affective associations with sexual stimuli were found in women with vaginismus. Following therapist-aided exposure treatment, the strength of fear was strongly reduced, whereas global positive affective associations were strengthened. Automatic associations did not differ between women with and without vaginismus and did not change following treatment. Relatively stronger negative (threat or global affect) associations with sexual stimuli in vaginismus appeared restricted to the deliberate level. Therapist-aided exposure treatment was effective in reducing subjective fear of sexual penetration stimuli and led to more global positive affective

  5. GLOBE at Night: a Worldwide Citizen-Science Program to Increase Awareness of Light Pollution by Measuring Night Sky Brightness

    Science.gov (United States)

    Walker, C. E.; Pompea, S. M.

    2011-12-01

    The emphasis in the international citizen-science, star-hunting campaign, GLOBE at Night, is in bringing awareness to the public on issues of light pollution. Light pollution threatens not only observatory sites and our "right to starlight", but can affect energy consumption, wildlife and health. GLOBE at Night has successfully reached a few 100,000 citizen-scientists. What has contributed to its success? Foundational resources are available to facilitate the public's participation in promoting dark skies awareness. The GLOBE at Night website explains clearly the simple-to-participate-in 5 step program and offers background information and interactive games on key concepts. To promote the campaign via popular social media, GLOBE at Night created Facebook and Twitter pages. The program has been expanded to include trainings of the general public, but especially educators in schools, museums and science centers, in unique ways. Education kits for dark skies awareness have been distributed at the training workshops. The kit includes material for a light shielding demonstration, a digital Sky Quality Meter and "Dark Skies Rangers" activities. The activities are on how unshielded light wastes energy, how light pollution affects wildlife and how one can participate in a citizen-science star-hunt like GLOBE at Night. To increase participation in the 2011 campaign, children and adults submitted their sky brightness measurements in real time with smart phones or tablets using the web application at www.globeatnight.org/webapp/. With smart phones and tablets, the location, date and time register automatically. For those without smart mobile devices, user-friendly tools on the GLOBE at Night report page were reconfigured to determine latitude and longitude more easily and accurately. As a proto-type for taking multiple measurements, people in Tucson found it easy to adopt a street and take measurements every mile for the length of the street. The grid of measurements

  6. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  7. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  8. From core belief challenge to posttraumatic growth in para sport athletes: moderated mediation by needs satisfaction and deliberate rumination.

    Science.gov (United States)

    Hammer, Chris; Podlog, Leslie; Wadey, Ross; Galli, Nick; Forber-Pratt, Anjali J; Newton, Maria

    2018-04-25

    To examine how deliberate rumination and psychological need satisfaction interact to facilitate posttraumatic growth for para sport athletes with acquired disability. Utilizing a sample of 70 para sport athletes, the hypothesized mediating role of deliberate rumination was examined via a simple mediation model. The interaction between needs satisfaction and deliberate rumination and their effect on posttraumatic growth was examined utilizing a moderated mediation procedure. Disruption to one's core beliefs was significantly associated with posttraumatic growth. This relationship, was in part, explained by the deliberate rumination engaged in soon after the trauma. Needs satisfaction, while a significant predictor of posttraumatic growth, did not moderate the indirect effect. Although deliberate rumination at both timeframes and needs satisfaction were independently associated with posttraumatic growth, they did not interact in the hypothesized manner to influence posttraumatic growth. There remains a need to better understand how the experience of posttraumatic growth is achieved amongst individuals with acquired disability, and the role that para sport may play in this process. Implications for rehabilitation The disruption to one's core beliefs caused by acquiring a physical disability is not only a natural experience but also a necessary antecedent to posttraumatic growth. As such, rehabilitation practitioners ought to normalize these types of challenges when working with individuals with acquired disability. Practitioners may help to facilitate growth outcomes by encouraging individuals to deliberately ruminate about their acquired disability. That is, practitioners can help those with acquired disability to seek meaning and understanding about their disability or the precipitating event. For those who struggle to deliberately ruminate in the immediate disability aftermath, practitioners may encourage para sport participation to potentially prompt constructive

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  10. Deliberate release of genetically modified plants into the environment in Slovenia

    Directory of Open Access Journals (Sweden)

    Zlata LUTHAR

    2015-11-01

    Full Text Available Deliberate release of genetically modified higher plants (GMHPs into the environment in Slovenia is regulated by the Law on the Management of Genetically Modified Organisms (ZRGSO Ur. l. RS 23/2005 and 21/2010, III chapter. For each deliberate release of GMPs into the environment a license issued by the Ministry of Environment and Spatial Planning (MESP must be acquired. The application or notification should contain a very accurate and complex description of the GMP, of the field where it will be released and of wider surroundings or environment. The application consists of Annex 2 with accessories: 1. Part A (technical data for the authorization of deliberate GMP release into the environment; 2. Part B (environmental risk assessment; 3. Application summary in Slovenian and English language for the release of GMP into environment, which is transmitted to Brussels by MESP; 4. Extract from the Land Cadastre of the field to which the GMP will be released. The release procedure runs (till here under the above mentioned Law, which has been in place for several years and which clearly defines that it is possible to release GMP in Slovenia. In the case of GM rice in 2011, the law applied till the site selection of the experiment. Here, the law was not sufficiently taken into account. It was prevailed by the regulation of Farmland and Forest Fund of the Republic of Slovenia and municipal decision, which was stronger than the national law and prevented the cultivation of GM rice in an area that is legally suitable for release of GMO into the environment. Rice is not grown in Slovenia and does not have wild ancestors or close relatives with whom it might mate. Nearest area of cultivation is in neighboring Italy, which is from potentially selected location in Slovenia more than 70 km away.

  11. Problem solving ability and repetition of deliberate self-harm: a multicentre study.

    NARCIS (Netherlands)

    McAuliffe, C.; Corcoran, P.; Keeley, H.S.; Arensman, E.; Bille Brahe, U.; de Leio, D.; Fekete, S.; Hawton, K.; Hjelmeland, H.; Kelleher, M.; Kerkhof, A.J.F.M.; Lonnqvist, J.; Michel, K.; Salander Renberg, E.; Schmidtke, A.; van Heeringen, K.; Wasserman, D.

    2006-01-01

    Background. While recent studies have found problem-solving impairments in individuals who engage in deliberate self-harm (DSH), few studies have examined repeaters and non-repeaters separately. The aim of the present study was to investigate whether specific types of problem-solving are associated

  12. Adolescent Deliberate Self-Harm: Linkages to Emotion Regulation and Family Emotional Climate

    Science.gov (United States)

    Sim, Leslie; Adrian, Molly; Zeman, Janice; Cassano, Michael; Friedrich, William N.

    2009-01-01

    Parents' responses to their children's emotional expressivity have been shown to significantly influence children's subsequent psychosocial functioning. This study hypothesized that adolescents' deliberate self-harm (DSH) may be an outcome associated with poor emotion regulation as well as an invalidating family environment. The mediational role…

  13. Sophistic Ethics in the Technical Writing Classroom: Teaching "Nomos," Deliberation, and Action.

    Science.gov (United States)

    Scott, J. Blake

    1995-01-01

    Claims that teaching ethics is particularly important to technical writing. Outlines a classical, sophistic approach to ethics based on the theories and pedagogies of Protagoras, Gorgias, and Isocrates, which emphasizes the Greek concept of "nomos," internal and external deliberation, and responsible action. Discusses problems and…

  14. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  15. Schizophrenia and Deliberate Self-Harm: A Systematic Review of Risk Factors

    Science.gov (United States)

    Haw, Camilla; Hawton, Keith; Sutton, Lesley; Sinclair, Julia; Deeks, Jonathan

    2005-01-01

    Deliberate self-harm (DSH) is a strong predictor of suicide in schizophrenia. The aim of this review was to identify risk factors for DSH in schizophrenia. This systematic review of the international literature examined cohort and case-control studies of patients with schizophrenia or related diagnoses that reported DSH as an outcome. Studies were…

  16. Night work, light exposure and melatonin on work days and days off.

    Science.gov (United States)

    Daugaard, Stine; Garde, Anne Helene; Bonde, Jens Peter Ellekilde; Christoffersen, Jens; Hansen, Äse Marie; Markvart, Jakob; Schlünssen, Vivi; Skene, Debra J; Vistisen, Helene Tilma; Kolstad, Henrik A

    2017-01-01

    We aimed to examine the effects of night work on salivary melatonin concentration during and subsequent to night work and the mediating role of light. We included 254 day workers and 87 night workers who were followed during 322 work days and 301 days off work. Each day was defined as the 24 hour period starting from the beginning of a night shift or from waking in the mornings with day work and days off. Light levels were recorded and synchronized with diary information (start and end of sleep and work). On average, participants provided four saliva samples per day, and these were analyzed for melatonin concentration by liquid chromatography tandem mass spectrometry (LC-MS/MS). Differences between day and night workers on work days and days off were assessed with multilevel regression models with melatonin concentration as the primary outcome. All models were stratified or adjusted by time of day. For light exposure, we estimated the total, direct and indirect effects of night work on melatonin concentrations obtaining 95% confidence intervals through bootstrapping. On work days, night workers showed 15% lower salivary melatonin concentrations compared with day workers (-15.0%; 95% CI: -31.4%; 5.2%). During the night, light exposure mediated a melatonin suppression of approximately 6% (-5.9%, 95% CI: -10.2%; -1.5%). No mediating effect of light was seen during the day time. On days off, we observed no difference in melatonin concentrations between day and night workers. These findings are in accordance with a transient and partly light-mediated effect of night work on melatonin production.

  17. Sleep, ageing and night work

    Directory of Open Access Journals (Sweden)

    M.L.N. Pires

    2009-09-01

    Full Text Available Studies have shown that the frequency or worsening of sleep disorders tends to increase with age and that the ability to perform circadian adjustments tends to decrease in individuals who work the night shift. This condition can cause consequences such as excessive sleepiness, which are often a factor in accidents that occur at work. The present study investigated the effects of age on the daytime and nighttime sleep patterns using polysomnography (PSG of long-haul bus drivers working fixed night or day shifts. A total of 124 drivers, free of sleep disorders and grouped according to age (<45 years, N = 85, and ≥45 years, N = 39 and PSG timing (daytime (D PSG, N = 60; nighttime (N PSG, N = 64 participated in the study. We observed a significant effect of bedtime (D vs N and found that the length of daytime sleep was shorter [D: <45 years (336.10 ± 73.75 min vs N: <45 years (398 ± 78.79 min and D: ≥45 years (346.57 ± 43.17 min vs N: ≥45 years (386.44 ± 52.92 min; P ≤ 0.05]. Daytime sleep was less efficient compared to nighttime sleep [D: <45 years (78.86 ± 13.30% vs N: <45 years (86.45 ± 9.77% and D: ≥45 years (79.89 ± 9.45% and N: ≥45 years (83.13 ± 9.13%; P ≤ 0.05]. An effect of age was observed for rapid eye movement sleep [D: <45 years (18.05 ± 6.12% vs D: ≥45 years (15.48 ± 7.11% and N: <45 years (23.88 ± 6.75% vs N: ≥45 years (20.77 ± 5.64%; P ≤ 0.05], which was greater in younger drivers. These findings are inconsistent with the notion that older night workers are more adversely affected than younger night workers by the challenge of attempting to rest during the day.

  18. Glucocorticoid management in rheumatoid arthritis: morning or night low dose?

    Directory of Open Access Journals (Sweden)

    Sabrina Paolino

    2017-08-01

    Full Text Available Morning symptoms of rheumatoid arthritis (RA are linked to circadian increase of night inflammation, supported by inadequate cortisol secretion in active disease. Therefore, exogenous glucocorticoid administration in RA is recommended by EULAR and ACR from the beginning of the diagnosis, since may partially act like a “replacement therapy”. In addition, the prevention/treatment of the night up-regulation of the immune/inflammatory reaction has been shown more effective when exogenous glucocorticoid administration is managed with a night-time-release formulation. Despite a considerably higher cost than conventional prednisone (immediate release, chronotherapy with night-time-release prednisone has been recognized a cost-effective option for RA patients not on glucocorticoids who are eligible for therapy with biologic disease-modifying antirheumatic drugs (DMARDs. Interestingly, since different cell populations involved in the inflammatory process are particularly activated during the night (i.e. monocytes, macrophages, other therapeutical approaches used in RA, such as conventional DMARDs and non-steroidal anti-inflammatory drugs (NSAIDs should follow the same concepts of glucocorticoid chronotherapy. Therefore, bedtime methotrexate chronotherapy was found to better manage RA symptoms, and several available NSAIDs (i.e. indomethacin, aceclofenac, ketoprofen, flurbiprofen, lornoxicam have been recently modified in their formulation, in order to obtain more focused night action.

  19. Passive cooling of buildings by night-time ventilation - Final report

    Energy Technology Data Exchange (ETDEWEB)

    Artmann, N.; Manz, H. [Swiss Federal Laboratories for Materials Testing and Research (EMPA), Duebendorf (Switzerland); Heiselberg, P. [Aalborg University, Aalborg (Denmark)

    2008-07-01

    Due to an overall trend towards an increasing cooling energy demand in buildings in many European countries over the last few decades, passive cooling by night-time ventilation is seen as a promising concept. However, because of uncertainties in thermal comfort predictions, architects and engineers are still hesitant to apply passive cooling techniques. As night-time ventilation is highly dependent on climatic conditions, a method for quantifying the climatic cooling potential was developed and the impact of climate warming was investigated. Although a clear temperature decrease was found, significant potential will remain, especially if night-time ventilation is applied in combination with other cooling methods. Building energy simulations showed that the performance of night-time ventilation is also affected by the heat transfer at internal room surfaces, as the cooling effect is very limited due to heat transfer coefficients below about 4 W/m{sup 2}K. Heat transfer during night-time ventilation in case of mixing and displacement ventilation was investigated in a full scale test room at Aalborg University. In the experiments the temperature efficiency of the ventilation was determined. Based on the previous results a method for estimating the potential for cooling by night-time ventilation at an early stage of design was developed. (author)

  20. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  1. Mental Models and Deliberate Manipulation of Data

    DEFF Research Database (Denmark)

    Koester, Thomas; Jakobsen, Jeanette; Brøsted, Jesper Ejdorf

    2015-01-01

    Human factors risk analysis and usability tests in telemedicine contexts primarily seek to investigate how to reduce the likelihood of slips, lapses and mistakes. However, to ensure trustworthiness in e-health data, one must also be aware of more intentional patient actions which could potentially...... compromise patient safety and/or the integrity of the system. The pilot study in this paper set out to explore mental models and deliberate manipulation of data in a Danish telemedicine setting of home monitoring among pregnant women. Results show, that patients construct mental models of the telemedicine...... system, and that the patient can utilize such mental models in attempts to manipulate their data input to get a desired output from the telemedicine system....

  2. Who is sleepier on the night shift? The influence of bio-psycho-social factors on subjective sleepiness of female nurses during the night shift.

    Science.gov (United States)

    Zion, Nataly; Drach-Zahavy, Anat; Shochat, Tamar

    2018-07-01

    Sleepiness is a common complaint during the night shift and may impair performance. The current study aims to identify bio-psycho-social factors associated with subjective sleepiness during the night shift. Ninety-two female nurses working rotating shifts completed a sociodemographic questionnaire, the Munich ChronoType Questionaire for shift workers, the Pittsburg Sleep Quality Index, and the Pre-sleep Arousal Scale. Subjective sleepiness was measured hourly during two night shifts using the Karolinska Sleepiness Scale, and activity monitors assessed sleep duration 24-h before each shift. Findings showed that increased sleepiness was associated with increased age in nurses with early chronotypes and with more children. High cognitive pre-sleep arousal, but not sleep, was associated with increased sleepiness, especially in late chronotypes. The impact of bio-psycho-social factors on night shift sleepiness is complex, and depends on mutual interactions between these factors. Nurses most prone to increased sleepiness must develop personal strategies for maintaining vigilance on the night shift. Practitioner Summary: This study aims to identify bio-psycho-social factors associated with subjective sleepiness of female nurses during the night shift. Increasing sleepiness was associated with increased age in nurses with early chronotypes and with more children. Increased cognitive pre-sleep arousal, but not sleep, was associated with increased sleepiness, especially in late chronotypes.

  3. 'Irrigation by night' in the Eastern Cape, South Africa

    African Journals Online (AJOL)

    2017-01-01

    Jan 1, 2017 ... tions in irrigation systems in the night: 'It is common place that the night is the time ..... roads and rainwater tanks ('JoJo's') to water the gardens. The ..... drainage system throughout the home garden, but also directly from the ...

  4. Deliberation and Scale in Mekong Region Water Governance

    Science.gov (United States)

    Dore, John; Lebel, Louis

    2010-07-01

    Understanding the politics of deliberation, scales, and levels is crucial to understanding the social complexity of water-related governance. Deliberative processes might complement and inform more conventional representational and bureaucratic approaches to planning and decision-making. However, they are also subject to scale and level politics, which can confound institutionalized decision-making. Scale and level contests arise in dialogues and related arenas because different actors privilege particular temporal or spatial scales and levels in their analysis, arguments, and responses. Scale contests might include whether to privilege administrative, hydrological, ecosystem, or economic boundaries. Level contests might include whether to privilege the subdistrict or the province, the tributary watershed or the international river basin, a river or a biogeographic region, and the local or the regional economy. In the Mekong Region there is a recurrent demand for water resources development projects and major policies proposed by governments and investors to be scrutinized in public. Deliberative forms of engagement are potentially very helpful because they encourage supporters and critics to articulate assumptions and reasoning about the different opportunities and risks associated with alternative options, and in doing so, they often traverse and enable higher-quality conversations within and across scales and within and between levels. Six case studies from the Mekong Region are examined. We find evidence that scale and level politics affects the context, process, content, and outcomes of deliberative engagement in a region where public deliberation is still far from being a norm, particularly where there are sensitive and far-reaching choices to be made about water use and energy production.

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  7. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Bioethics education in clinical settings: theory and practice of the dilemma method of moral case deliberation.

    Science.gov (United States)

    Stolper, Margreet; Molewijk, Bert; Widdershoven, Guy

    2016-07-22

    Moral Case Deliberation is a specific form of bioethics education fostering professionals' moral competence in order to deal with their moral questions. So far, few studies focus in detail on Moral Case Deliberation methodologies and their didactic principles. The dilemma method is a structured and frequently used method in Moral Case Deliberation that stimulates methodological reflection and reasoning through a systematic dialogue on an ethical issue experienced in practice. In this paper we present a case-study of a Moral Case Deliberation with the dilemma method in a health care institution for people with an intellectual disability, describing the theoretical background and the practical application of the dilemma method. The dilemma method focuses on moral experiences of participants concerning a concrete dilemma in practice. By an in-depth description of each of the steps of the deliberation process, we elucidate the educational value and didactics of this specific method. The didactics and methodical steps of the dilemma method both supported and structured the dialogical reflection process of the participants. The process shows that the participants learned to recognize the moral dimension of the issue at stake and were able to distinguish various perspectives and reasons in a systematic manner. The facilitator played an important role in the learning process of the participants, by assisting them in focusing on and exploring moral aspects of the case. The reflection and learning process, experienced by the participants, shows competency-based characteristics. The role of the facilitator is that of a Socratic teacher with specific knowledge and skills, fostering reflection, inquiry and dialogue. The specific didactics of the dilemma method is well suited for teaching bioethics in clinical settings. The dilemma method follows an inductive learning approach through a dialogical moral inquiry in which participants develop not only knowledge but also skills

  9. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  10. Rotating night shift work, sleep, and colorectal adenoma in women.

    Science.gov (United States)

    Devore, Elizabeth E; Massa, Jennifer; Papantoniou, Kyriaki; Schernhammer, Eva S; Wu, Kana; Zhang, Xuehong; Willett, Walter C; Fuchs, Charles S; Chan, Andrew T; Ogino, Shuji; Giovannucci, Edward; Wei, Esther K

    2017-07-01

    This study aims to investigate the associations of rotating night shift work history and sleep duration with risk of colorectal adenoma. We evaluated 56,275 cancer-free participants of the Nurses' Health Study II, who had their first colonoscopy or sigmoidoscopy between 1991 and 2011; rotating night shift work and sleep duration were reported by mailed questionnaire. Multivariable-adjusted logistic regression was used to estimate relative risks (RR) of colorectal adenoma, with 95% confidence intervals (CI), across categories of rotating night shift work history (none, 1-4, 5-9, and ≥10 years) and sleep duration (≤5, 6, 7, 8, and ≥9 h/day). We found no association between duration of rotating night shift work and occurrence of colorectal adenoma (p-trend across shift work categories = 0.5). Women with the longest durations of rotating night shift work (≥10 years) had a similar risk of adenoma compared to women without a history of rotating night shift work (multivariable-adjusted RR = 0.96, 95% CI = 0.83-1.11). Similarly, there were no associations of shorter or longer sleep durations with adenoma risk (p-trend = 0.2 across sleep durations of ≤5 through 7 h/day and p-trend = 0.5 across sleep durations of 7 through ≥9 h/day). Results were similar when we examined associations according to adenoma location and subtype. Our results do not support an association between rotating night shift work or sleep duration and risk of colorectal adenoma in women.

  11. Beyond Reactive Planning: Self Adaptive Software and Self Modeling Software in Predictive Deliberation Management

    National Research Council Canada - National Science Library

    Lenahan, Jack; Nash, Michael P; Charles, Phil

    2008-01-01

    .... We present the following hypothesis: predictive deliberation management using self-adapting and self-modeling software will be required to provide mission planning adjustments after the start of a mission...

  12. Sira Nights as a Recreational Tourism Activity

    OpenAIRE

    Barakazı, Mahmut; Önçel, Sibel

    2017-01-01

    In terms of culture, art and gastronomy, Urfa sira nights are the basis for an important recreational activity. Recreational activities in these regions provide tourism awareness, as well as the benefits of introducing local Urfa cuisine, which is very rich in culinary culture, and Gastronomy leads to the recognition of tourism in the region. The aim of this research is to encourage recreational activities by promoting recreational activities such as Urfa sira 'nights' effects on ga...

  13. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  14. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  15. 78 FR 19742 - Centennial Challenges: 2014 Night Rover Challenge

    Science.gov (United States)

    2013-04-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-032] Centennial Challenges: 2014 Night... Centennial Challenges 2014 Night Rover Challenge. SUMMARY: This notice is issued in accordance with 51 U.S.C.... Centennial Challenges is a program of prize competitions to stimulate innovation in technologies of interest...

  16. European public deliberation on brain machine interface technology: five convergence seminars.

    Science.gov (United States)

    Jebari, Karim; Hansson, Sven-Ove

    2013-09-01

    We present a novel procedure to engage the public in ethical deliberations on the potential impacts of brain machine interface technology. We call this procedure a convergence seminar, a form of scenario-based group discussion that is founded on the idea of hypothetical retrospection. The theoretical background of this procedure and the results of five seminars are presented.

  17. Truth in politics : rhetorical approaches to democratic deliberation in Africa and beyond

    NARCIS (Netherlands)

    Salazar, P.J.; Osha, S.; Binsbergen, van W.M.J.

    2004-01-01

    Democracy is about competing "truths". This is why "rhetoric"- the study of public deliberation and the training in public debate and argumentation - is part of democracy in development. This volume acclimatizes "rhetoric" to the philosophical scene in South Africa, and more in general in Africa as

  18. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  19. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  20. Multitudes attend the Night of Science

    CERN Multimedia

    2006-01-01

    The Night of Science, which took place in the Parc de la Perle du Lac in Geneva last weekend, was a great success, with 30 000 visitors attending according to the organisers. Many curious people flocked to the stands and animations until late on Saturday night and all afternoon on Sunday. The CERN stand (photo) received a great amount of interest from participants. Both kids and adults discovered the activities of the Laboratory and the data-processing revolution initiated by CERN, from the Web to the Computing Grid. Hats off to the CERN collaborators in the Communication Group and IT Department who made this event a success.

  1. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  2. [Effect of the night shift work on micturition patterns of nurses].

    Science.gov (United States)

    Wang, Q; Hu, H; Liang, C; Wang, J; Xu, K X

    2016-08-18

    To compare the effects of rotational night shifts on the micturition patterns of female nurses. A total of 58 nurses without lower urinary tract symptoms were recruited, who worked in the Peking University People's Hospital during January and June in 2014. The nurses aged 20-43 years were divided into two groups, the night-shift group (n=28) and the non-shift group (n=30). The alcohol or coffee intaking were forbidden. In the night-shift group, nurses had worked on rotational shifts for at least 6 months. Their average age was (26.75±4.11) years. In the non-shift group, nurses took regular day-time work, whose average age was (27.80±5.60) years. A voiding diary was kept for 7 consecutive days at the end of 6 months, starting 2 days before their night duties until 4 days after completion of their night duties. For comparison, the non-shift group with regular shifts completed a 7-day voiding diary. In the 7-day recording voiding diary, the nurses were required to have the normal intake of liquid about 1 500-2 000 mL/d. The frequency volume charts of nocturia, the 8-hour interval urine production and frequency were compared between the two groups. Nocturia frequency was increased in the night-shift group [0.5 (0-2.4)] compared with the non-shift group [0 (0-2), P=0.02]. The volume of nocturia was increased in the night-shift group [125 mL (0-660 mL)] compared with the non-shift group [0 mL (0-340 mL), Pshift (Pnight-shift group increased on the day after night shift. When the night-shift nurses returned to daytime duty, the volume of urine decreased but nocturnal urine production remained high, and the frequency of nocturia also increased significantly (Pnight-shift group's voiding volume [(542.35±204.66) mL] and voiding frequency (2.24±0.69) were more than those of the non-shift group at the afternoon time (from 2 pm to 10 pm). During the 8 h interval night time (from 10 pm to 6 am), the volume of nocturia in the night-shift group [(309.74±162.74) mL] was more

  3. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  4. Increased and Mistimed Sex Hormone Production in Night Shift Workers

    OpenAIRE

    Papantoniou, K; Pozo, OJ; Espinosa, A; Marcos, J; Castano-Vinyals, G; Basagana, X; Juanola Pages, E; Mirabent, J; Martin, J; Such Faro, P; Gasco Aparici, A; Middleton, B; Skene, DJ; Kogevinas, M

    2015-01-01

    BACKGROUND: Night shift work has been associated with an increased risk for breast and prostate cancer. The effect of circadian disruption on sex steroid production is a possible underlying mechanism, underinvestigated in humans. We have assessed daily rhythms of sex hormones and melatonin in night and day shift workers of both sexes. METHODS: We recruited 75 night and 42 day workers, ages 22 to 64 years, in different working settings. Participants collected urine samples from all voids over ...

  5. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  6. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  7. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  8. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  9. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  10. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  11. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  12. Cognitive Functions of the Cerebellum Explain How Ericsson's Deliberate Practice Produces Giftedness

    Science.gov (United States)

    Vandervert, Larry R.

    2007-01-01

    A critical issue for Ericsson et al.'s proposal is the development of a fully adequate description of neurophysiological substrates for deliberate practice. Ericsson et al. do provide two substantial subsections on biological substrates--namely, their subsections, "Acquisition of superior power, control, and speed of motor activities" and…

  13. Seeing Stars: A GLOBE at Night Campaign Update

    Science.gov (United States)

    Walker, Constance E.; Pompea, S. M.; Sparks, R. T.; Newhouse, M.

    2012-01-01

    The emphasis in the international citizen-science, star-hunting campaign, GLOBE at Night, is in bringing awareness to the public on issues of light pollution. Light pollution threatens not only observatory sites and our "right to starlight", but can affect energy consumption, wildlife and health. GLOBE at Night has successfully reached a few 100,000 citizen-scientists. What has done in the last year to contribute to its success? • To promote the campaign via popular social media, GLOBE at Night created Facebook and Twitter pages. • Videos have been created for 4 out of 8 Dark Skies Rangers activities. • Sky brightness measurements can be submitted in real time with smart phones or tablets using the new Web application at www.globeatnight.org/webapp/. The location, date and time register automatically. • As a proto-type, an adopt-a-street program had people in Tucson take measurements every mile for the length of the street. Grid measurements canvassed the town, allowing for comparisons of light levels over time. • The increase to 2 campaigns in 2011 re-enforces these studies. In 2012, the campaign will be offered 4 times for 10 days a month: January 14-23, February 12-21, March 13-22 and April 11-20. • A new Web application (www.globeatnight.org/mapapp/) allows for mapping GLOBE at Night data points within a specified distance around a city or area of choice. The resulting maps are bookmarkable and shareable. • NOAO and Arizona Game and Fish Department started a project with GLOBE at Night data and bat telemetry to examine a dark skies corridor in Tucson where endangered bats fly. While providing these updates to the GLOBE at Night program, the presentation will highlight the education and outreach value of the program's resources and outcomes, lessons learned, successes and pitfalls in communicating awareness with the public and attracting young people to study science.

  14. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  15. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  16. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  17. Design and usability of heuristic-based deliberation tools for women facing amniocentesis.

    Science.gov (United States)

    Durand, Marie-Anne; Wegwarth, Odette; Boivin, Jacky; Elwyn, Glyn

    2012-03-01

    Evidence suggests that in decision contexts characterized by uncertainty and time constraints (e.g. health-care decisions), fast and frugal decision-making strategies (heuristics) may perform better than complex rules of reasoning. To examine whether it is possible to design deliberation components in decision support interventions using simple models (fast and frugal heuristics). The 'Take The Best' heuristic (i.e. selection of a 'most important reason') and 'The Tallying' integration algorithm (i.e. unitary weighing of pros and cons) were used to develop two deliberation components embedded in a Web-based decision support intervention for women facing amniocentesis testing. Ten researchers (recruited from 15), nine health-care providers (recruited from 28) and ten pregnant women (recruited from 14) who had recently been offered amniocentesis testing appraised evolving versions of 'your most important reason' (Take The Best) and 'weighing it up' (Tallying). Most researchers found the tools useful in facilitating decision making although emphasized the need for simple instructions and clear layouts. Health-care providers however expressed concerns regarding the usability and clarity of the tools. By contrast, 7 out of 10 pregnant women found the tools useful in weighing up the pros and cons of each option, helpful in structuring and clarifying their thoughts and visualizing their decision efforts. Several pregnant women felt that 'weighing it up' and 'your most important reason' were not appropriate when facing such a difficult and emotional decision. Theoretical approaches based on fast and frugal heuristics can be used to develop deliberation tools that provide helpful support to patients facing real-world decisions about amniocentesis. © 2011 Blackwell Publishing Ltd.

  18. Measuring and mapping the night sky brightness of Perth, Western Australia

    Science.gov (United States)

    Biggs, James D.; Fouché, Tiffany; Bilki, Frank; Zadnik, Marjan G.

    2012-04-01

    In order to study the light pollution produced in the city of Perth, Western Australia, we have used a hand-held sky brightness meter to measure the night sky brightness across the city. The data acquired facilitated the creation of a contour map of night sky brightness across the 2400 km2 area of the city - the first such map to be produced for a city. Importantly, this map was created using a methodology borrowed from the field of geophysics - the well proven and rigorous techniques of geostatistical analysis and modelling. A major finding of this study is the effect of land use on night sky brightness. By overlaying the night sky brightness map on to a suitably processed Landsat satellite image of Perth we found that locations near commercial and/or light industrial areas have a brighter night sky, whereas locations used for agriculture or having high vegetation coverage have a fainter night sky than surrounding areas. Urban areas have intermediate amounts of vegetation and are intermediate in brightness compared with the above-mentioned land uses. Regions with a higher density of major highways also appear to contribute to increased night sky brightness. When corrected for the effects of direct illumination from high buildings, we found that the night sky brightness in the central business district (CBD) is very close to that expected for a city of Perth's population from modelling work and observations obtained in earlier studies. Given that our night sky brightness measurements in Perth over 2009 and 2010 are commensurate with that measured in Canadian cities over 30 years earlier implies that the various lighting systems employed in Perth (and probably most other cities) have not been optimised to minimize light pollution over that time. We also found that night sky brightness diminished with distance with an exponent of approximately -0.25 ± 0.02 from 3.5 to 10 km from the Perth CBD, a region characterized by urban and commercial land use. For distances

  19. The Sky at Night

    CERN Document Server

    Moore, Patrick

    2010-01-01

    For more than 50 years now Sir Patrick Moore has presented the BBC Television series Sky at Night; not a month has been missed – a record for any television series, and a record which may never be broken. Every three years or so a book is published covering the main events in both astronomy and space research. This is the 13th volume, not only a record of the programmes but also of the great advances and discoveries during the period covered - eclipses, comets, and the strange chemical lakes of Titan, for instance, but also anniversaries such as the fifteenth “birthday” of the Hubble Space Telescope, and not forgetting the programme celebrating the Sky at Night’s 50th year, attended by astronaut Piers Sellars and many others who appeared on the programme over the years. All the chapters are self-contained, and fully illustrated. In this new Sky at Night book you will find much to entertain you. It will appeal to amateurs and professionals alike.

  20. Night shift work at specific age ranges and chronic disease risk factors

    Science.gov (United States)

    Ramin, Cody; Devore, Elizabeth E; Wang, Weike; Pierre-Paul, Jeffrey; Wegrzyn, Lani R; Schernhammer, Eva S

    2014-01-01

    Objectives We examined the association of night shift work history and age when night shift work was performed with cancer and cardiovascular disease risk factors among 54 724 women in the Nurses' Health Study (NHS) II. Methods We calculated age-adjusted and socioeconomic status-adjusted means and percentages for cancer and cardiovascular risk factors in 2009 across categories of night shift work history. We used multivariable-adjusted logistic regression to estimate odds ratios (ORs) and 95% CIs for key risk factors among 54 724 participants (72% ever shift workers). We further examined these associations by age (20–25, 26–35, 36– 45 and 46+ years) at which shift work was performed. Results Ever night shift workers had increased odds of obesity (body mass index ≥30 kg/m2; OR=1.37, 95% CI 1.31 to 1.43); higher caffeine intake (≥131 mg/day; OR=1.16, 95% CI 1.12 to 1.22) and total calorie intake (≥1715 kcal/day; OR=1.09, 95% CI 1.04 to 1.13); current smoking (OR=1.30, 95% CI 1.19 to 1.42); and shorter sleep durations (≤7 h of sleep/day; OR=1.19, 95% CI 1.15 to 1.24) compared to never night shift workers. These estimates varied depending on age at which night work was performed, with a suggestion that night shift work before age 25 was associated with fewer risk factors compared to night shift work at older ages. Conclusions Our results indicate that night shift work may contribute to an adverse chronic disease risk profile, and that risk factors may vary depending on the age at which night shift work was performed. PMID:25261528

  1. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  2. Cellular phone use while driving at night.

    Science.gov (United States)

    Vivoda, Jonathon M; Eby, David W; St Louis, Renée M; Kostyniuk, Lidia P

    2008-03-01

    Use of a cellular phone has been shown to negatively affect one's attention to the driving task, leading to an increase in crash risk. At any given daylight hour, about 6% of US drivers are actively talking on a hand-held cell phone. However, previous surveys have focused only on cell phone use during the day. Driving at night has been shown to be a riskier activity than driving during the day. The purpose of the current study was to assess the rate of hand-held cellular phone use while driving at night, using specialized night vision equipment. In 2006, two statewide direct observation survey waves of nighttime cellular phone use were conducted in Indiana utilizing specialized night vision equipment. Combined results of driver hand-held cellular phone use from both waves are presented in this manuscript. The rates of nighttime cell phone use were similar to results found in previous daytime studies. The overall rate of nighttime hand-held cellular phone use was 5.8 +/- 0.6%. Cellular phone use was highest for females and for younger drivers. In fact, the highest rate observed during the study (of 11.9%) was for 16-to 29-year-old females. The high level of cellular phone use found within the young age group, coupled with the increased crash risk associated with cellular phone use, nighttime driving, and for young drivers in general, suggests that this issue may become an important transportation-related concern.

  3. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  4. Night work and the reproductive health of women: an integrated literature review.

    Science.gov (United States)

    Chau, Yu Moon; West, Sandra; Mapedzahama, Virginia

    2014-01-01

    The aim of this review was to synthesize current evidence on the effects of night work on the major stages of women's reproductive health, specifically the menstrual cycle, fertility, pregnancy, and menopause. Current understanding suggests that night work (work that causes disruption of a worker's circadian [day/night] rhythms) adversely affects workers' health and well-being. A complex relationship exists between circadian rhythms and reproductive hormones, and this may potentially increase the vulnerability of women to the detrimental effect of night work, including during menopause. A systematic search was conducted (March-May 2011) via CINAHL, MEDLINE, Sociological Abstracts, and Business Source Premier for primary research studies written in English using the key words "shift-work" and "female/women." Findings of identified articles were themed to pregnancy, fertility, aspects of menstrual cycles, and menopause. Twenty articles were identified, (13 articles concerning pregnancy, 3 addressing fertility, and 4 addressing aspects of the menstrual cycle) but no studies addressing menopause were located. All identified articles demonstrated problematic approaches to the determination of night-work exposure. Evidence of the impact of night work on female reproductive health as presented in the current literature is inconclusive. Moreover, available evidence needs to be interpreted with caution, given the various limitations and inconsistencies among the studies in the measurement of night-work exposure and shift-work patterns. Studies that focus specifically on night work are needed to facilitate an understanding of the impact of circadian disruption on the reproductive health of women undertaking night work. © 2013 by the American College of Nurse-Midwives.

  5. [Possibilities and limits of sleep recovery for night-nursing workers].

    Science.gov (United States)

    de Medeiros, Soraya Maria; de Macêdo, Maria Lúcia Azevedo Ferreira; de Oliveira, Jonas Sâmi Albuquerque; Ribeiro, Laiane Medeiros

    2009-03-01

    The present study had the objective of investigating the possibilities/limits of sleep recovery in women workers with medium level in nursing that develop their activities in night shifts in a first-aid clinic at a public hospital in Natal, Rio Grande do Norte, Brazil. This was an analytic study, with a qualitative approach which used the technique of thematic oral history Fifteen women workers with medium level in nursing were interviewed. The following empirical categories were defined: night shift work and night sleep and night rest at work environment Physiological and psychological sufferings are evident on their speech as well as what the lack of sleep causes in health and personal life of these women workers, making the overload of work clear and also the sociocultural imperfections of feminine gender

  6. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  7. TRUTH OR DARE: ONLINE DELIBERATION. A CASE STUDY OF TWO INTERNET BASED DELIBERATIVE PLATFORMS

    Directory of Open Access Journals (Sweden)

    Luana Maria BIDAȘCĂ

    2011-06-01

    Full Text Available In this article, I attempt to discuss how the internet can be used to stimulate an effective communication between citizens and decision-makers. In particular, I will aim to see if it can facilitate a greater degree of deliberation among citizens, if it can make democracy more inclusive and if it can make decision makers more responsible. I will first look at the definition and characteristics of deliberative democracy. Then after looking at what has been written so far about the effect of online discussions on democracy, I shall analyze the role the internet played in two case studies: web based participatory budgeting (PB and domnuleprimar.ro (DearMrMayor.ro. Both of these platforms were designed to create a closer bond between decisionmakers and citizens and will thus prove relevant to the discussion. Finally, I conclude that while the two case studies seem to favor increased inclusiveness, it only partially increases accountability and does not register any significant progress with regard to deliberation. Still, I argue that reasons for optimism exist even with regard to the deliberative aspect. Since the debate regarding the value of online deliberation is far from over, more research is needed in order to perhaps design a framework which will allow us to exploit the democratic value of the internet to its full potential.

  8. Dose-dependent responses of avian daily rhythms to artificial light at night

    NARCIS (Netherlands)

    De Jong, M.; Jeninga, L.; Ouyang, Jenny; van Oers, K.; Spoelstra, K.; Visser, M.E.

    2016-01-01

    Recent studies have shown that animals are affected by night-time light exposure. Light is a continuous variable, but our knowledge on how individuals react to different light intensities during the night is limited. We therefore determined the relationship between night light intensity and the

  9. Dose-dependent responses of avian daily rhythms to artificial light at night

    NARCIS (Netherlands)

    de Jong, Maaike; Jeninga, Lizanne; Ouyang, Jenny Q; van Oers, Kees; Spoelstra, Kamiel; Visser, Marcel E

    2015-01-01

    Recent studies have shown that animals are affected by night-time light exposure. Light is a continuous variable, but our knowledge on how individuals react to different light intensities during the night is limited. We therefore determined the relationship between night light intensity and the

  10. Night work and prostate cancer in men: a Swedish prospective cohort study.

    Science.gov (United States)

    Åkerstedt, Torbjrn; Narusyte, Jurgita; Svedberg, Pia; Kecklund, Göran; Alexanderson, Kristina

    2017-06-08

    Prostate cancer is the most common cancer and the second leading cause of cancer-related deaths among men, but the contributing factors are unclear. One such may be night work because of the day/night alternation of work and the resulting disturbance of the circadian system. The purpose of the present study was to investigate the prospective relation between number of years with night work and prostate cancer in men. Cohort study comparing night and day working twins with respect to incident prostate cancer in 12 322 men. Individuals in the Swedish Twin Registry. 12 322 male twins. Prostate cancer diagnoses obtained from the Swedish Cancer Registry with a follow-up time of 12 years, with a total number of cases=454. Multiple Cox proportional hazard regression analysis, adjusted for a number of covariates, showed no association between ever night work and prostate cancer, nor for duration of night work and prostate cancer. Analysis of twin pairs discordant for prostate cancer (n=332) showed no significant association between night work and prostate cancer. The results, together with previous studies, suggest that night work does not seem to constitute a risk factor for prostate cancer. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  13. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  14. Auditory Attention and Comprehension During a Simulated Night Shift: Effects of Task Characteristics.

    Science.gov (United States)

    Pilcher, June J; Jennings, Kristen S; Phillips, Ginger E; McCubbin, James A

    2016-11-01

    The current study investigated performance on a dual auditory task during a simulated night shift. Night shifts and sleep deprivation negatively affect performance on vigilance-based tasks, but less is known about the effects on complex tasks. Because language processing is necessary for successful work performance, it is important to understand how it is affected by night work and sleep deprivation. Sixty-two participants completed a simulated night shift resulting in 28 hr of total sleep deprivation. Performance on a vigilance task and a dual auditory language task was examined across four testing sessions. The results indicate that working at night negatively impacts vigilance, auditory attention, and comprehension. The effects on the auditory task varied based on the content of the auditory material. When the material was interesting and easy, the participants performed better. Night work had a greater negative effect when the auditory material was less interesting and more difficult. These findings support research that vigilance decreases during the night. The results suggest that auditory comprehension suffers when individuals are required to work at night. Maintaining attention and controlling effort especially on passages that are less interesting or more difficult could improve performance during night shifts. The results from the current study apply to many work environments where decision making is necessary in response to complex auditory information. Better predicting the effects of night work on language processing is important for developing improved means of coping with shiftwork. © 2016, Human Factors and Ergonomics Society.

  15. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  16. Clinical Diagnostic and Sociocultural Dimensions of Deliberate Self-Harm in Mumbai, India

    Science.gov (United States)

    Parkar, Shubhangi R.; Dawani, Varsha; Weiss, Mitchell G.

    2006-01-01

    Patients' accounts complement psychiatric assessment of deliberate self-harm (DSH). In this study we examined psychiatric disorders, and sociocultural and cross-cultural features of DSH. SCID diagnostic interviews and a locally adapted EMIC interview were used to study 196 patients after DSH at a general hospital in Mumbai, India. Major depression…

  17. Research Evidence and School Board Deliberations: Lessons from Three Wisconsin School Districts

    Science.gov (United States)

    Asen, Robert; Gurke, Deb; Conners, Pamela; Solomon, Ryan; Gumm, Elsa

    2013-01-01

    This article analyzes the use of research evidence in school-board deliberations in three school districts in Wisconsin. In these settings, the circulation, meaning, and function of research depended importantly on the interests and backgrounds of advocates, the composition of audiences, and the values and contexts of decision-making. Board…

  18. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  19. Assault on the USS LIBERTY: Deliberate Action or Tragic Accident?

    Science.gov (United States)

    2007-03-30

    fear of an Egyptian attack from the sea compounded with the explosion at al-‘Arish, set the events into motion.74 The torpedo boats miscalculated...differences with the USS Liberty. The Liberty is 200 feet longer, covered with antennas, and has a state-of-the-art parabolic satellite dish.85 Perhaps...collection position.] 14 Ibid, 13. 15 Ibid, 14. 16 William D. Gerhard and Henry W. Millington, Attack on a Sigint Collector , the U.S.S Liberty

  20. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  1. One angry woman: Anger expression increases influence for men, but decreases influence for women, during group deliberation.

    Science.gov (United States)

    Salerno, Jessica M; Peter-Hagene, Liana C

    2015-12-01

    We investigated whether expressing anger increases social influence for men, but diminishes social influence for women, during group deliberation. In a deception paradigm, participants believed they were engaged in a computer-mediated mock jury deliberation about a murder case. In actuality, the interaction was scripted. The script included 5 other mock jurors who provided verdicts and comments in support of the verdicts; 4 agreed with the participant and 1 was a "holdout" dissenter. Holdouts expressed their opinions with no emotion, anger, or fear and had either male or female names. Holdouts exerted no influence on participants' opinions when they expressed no emotion or fear. Participants' confidence in their own verdict dropped significantly, however, after male holdouts expressed anger. Yet, anger expression undermined female holdouts: Participants became significantly more confident in their original verdicts after female holdouts expressed anger-even though they were expressing the exact same opinion and emotion as the male holdouts. Mediation analyses revealed that participants drew different inferences from male versus female anger, which created a gender gap in influence during group deliberation. The current study has implications for group decisions in general, and jury deliberations in particular, by suggesting that expressing anger might lead men to gain influence, but women to lose influence over others (even when making identical arguments). These diverging consequences might result in women potentially having less influence on societally important decisions than men, such as jury verdicts. (c) 2015 APA, all rights reserved).

  2. Experimental Assessment of Mechanical Night Ventilation on Inner Wall Surfaces

    DEFF Research Database (Denmark)

    Ji, Wenhui; Heiselberg, Per Kvols; Wang, Houhua

    2016-01-01

    The cooling potential of night ventilation largely depends on the heat exchange at the internal room surfaces. During night time, increased heat transfer on a vertical wall is expected due to cool supply air that flows along the internal wall surface from the top of the wall. This paper presents ...... an experimental study of the cooling of wall surfaces in a test room by mechanical night-time ventilation. Significant improvement of indoor thermal environment is presented resulting from the enhanced internal convection heat transfer....

  3. Dose-dependent responses of avian daily rhythms to artificial light at night

    NARCIS (Netherlands)

    Jong, de M.; Jeninga, L.; Ouyang, J.Q.; Oers, van K.; Spoelstra, K.; Visser, M.E.

    2016-01-01

    Recent studies have shown that animals are affected by night-time light exposure. Light is a continuous variable, but our knowledge on how individuals react to different light intensities during the night is limited. We therefore determined the relationship between night light intensity and the

  4. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  5. Emotions and clinical ethics support. A moral inquiry into emotions in moral case deliberation.

    Science.gov (United States)

    Molewijk, Bert; Kleinlugtenbelt, Dick; Pugh, Scott M; Widdershoven, Guy

    2011-12-01

    Emotions play an important part in moral life. Within clinical ethics support (CES), one should take into account the crucial role of emotions in moral cases in clinical practice. In this paper, we present an Aristotelian approach to emotions. We argue that CES can help participants deal with emotions by fostering a joint process of investigation of the role of emotions in a case. This investigation goes beyond empathy with and moral judgment of the emotions of the case presenter. In a moral case deliberation, the participants are invited to place themselves in the position of the case presenter and to investigate their own emotions in the situation. It is about critically assessing the facts in the case that cause the emotion and the related (moral) thoughts that accompany the emotion. It is also about finding the right emotion in a given situation and finding the right balance in dealing with that emotion. These steps in the moral inquiry give rise to group learning. It is a process of becoming open towards the perspectives of others, leading to new insights into what is an appropriate emotion in the specific situation. We show how this approach works in moral case deliberation. A physician presents a situation in which he is faced with a pregnant woman who is about to deliver multiple extremely premature infants at the threshold of viability. The moral deliberation of the case and the emotions therein leads to the participants' conclusion that "compassion" is a more adequate emotion than "sadness". The emotion "sadness" is pointed towards the tragedy that is happening to the woman. The emotion "compassion" is pointed towards the woman; it combines consideration and professional responsibility. Through the shift towards compassion, participants experienced more creativity and freedom to deal with the sad situation and to support the woman. The paper ends with an analysis and reflection on the deliberation process. In the conclusion we argue for more attention to

  6. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  7. Gender Roles and Night-Sky Watching among College Students

    Science.gov (United States)

    Kelly, William E.; McGee, Catherine M.

    2012-01-01

    The present study investigated the relationship between gender roles and night-sky watching in a sample of college students (N=161). The Bem Sex-Role Inventory (BSRI) and the Noctcaelador Inventory (NI) were used to investigate the differences between gender role groups for night-sky watching. The results supported the hypothesis that androgynous…

  8. Psyche and Society in Sendak's "In the Night Kitchen"

    Science.gov (United States)

    Adams, Rebecca V. L.; Rabkin, Eric S.

    2007-01-01

    While "Where the Wild Things Are" may be Maurice Sendak's most popular book, "In the Night Kitchen" is arguably the greater work. Though his journey in "Wild Things" shares many of the elements of Mickey's adventure in "Night Kitchen"--swinging between the protagonist's initiatory verbal assertions and silent, completely pictorial spreads that…

  9. Developing Emotionally Intelligent Leadership: The Need for Deliberate Practice and Collaboration across Disciplines

    Science.gov (United States)

    Allen, Scott J.; Shankman, Marcy Levy; Haber-Curran, Paige

    2016-01-01

    This chapter continues the discussion of what leadership education is and highlights the importance of emotionally intelligent leadership. The authors assert the need for deliberate practice and better collaboration between student affairs, academic affairs, and academic departments to develop emotionally intelligent leaders.

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  11. Deliberate ingestion of foreign bodies by institutionalised psychiatric hospital patients and prison inmates.

    LENUS (Irish Health Repository)

    O'Sullivan, S T

    2012-02-03

    Deliberate and recurrent foreign body ingestion is a common problem among institutionalised patients. We review our experience with 36 cases of deliberate foreign body ingestion by prisoners or psychiatric patients, thirty of whom were institutionalised at the time of ingestion. Symptoms were frequently severe in the prison inmate group but, in contrast, psychiatric patients presented with few, if any, symptoms. A majority of objects pass spontaneously or remain in situ without complication. Twenty-four patients were discharged following initial evaluation and without specific treatment. Eight of these were reviewed electively and discharged within one week. Twelve patients were admitted for observation, seven of whom were discharged within 48 hrs. Upper gastrointestinal endoscopy was performed in four patients and an intragastric foreign body identified in two cases. Laparotomy was performed in two cases for unresolving mechanical intestinal obstruction. Management should be conservative when possible, with surgery indicated only for complications.

  12. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  13. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  14. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. Talent identification and deliberate programming in skeleton: ice novice to Winter Olympian in 14 months.

    Science.gov (United States)

    Bullock, Nicola; Gulbin, Jason P; Martin, David T; Ross, Angus; Holland, Terry; Marino, Frank

    2009-02-15

    The aims of this study were to talent transfer, rapidly develop, and qualify an Australian female athlete in the skeleton event at the 2006 Torino Winter Olympic Games and quantify the volume of skeleton-specific training and competition that would enable this to be achieved. Initially, 26 athletes were recruited through a talent identification programme based on their 30-m sprint time. After attending a selection camp, 10 athletes were invited to undertake an intensified skeleton training programme. Four of these athletes were then selected to compete for Australia on the World Cup circuit. All completed runs and simulated push starts were documented over a 14-month period. The athlete who eventually represented Australia at the Torino Winter Olympic Games did so following approximately 300 start simulations and about 220 training/competition runs over a period of 14 months. Using a deliberate programming model, these findings provide a guide to the minimum exposure required for a novice skeleton athlete to reach Olympic representative standard following intensified sport-specific training. The findings of this study are discussed in the context of the deliberate practice theory and offer the term "deliberate programming" as an alternative way of incorporating all aspects of expert development.

  17. Dim light at night increases body mass of female mice.

    Science.gov (United States)

    Aubrecht, Taryn G; Jenkins, Richelle; Nelson, Randy J

    2015-05-01

    During the past century, the prevalence of light at night has increased in parallel with obesity rates. Dim light at night (dLAN) increases body mass in male mice. However, the effects of light at night on female body mass remain unspecified. Thus, female mice were exposed to a standard light/dark (LD; 16 h light at ∼150 lux/8 h dark at ∼0 lux) cycle or to light/dim light at night (dLAN; 16 h light at ∼150 lux/8 h dim light at ∼5 lux) cycles for six weeks. Females exposed to dLAN increased the rate of change in body mass compared to LD mice despite reduced total food intake during weeks five and six, suggesting that dLAN disrupted circadian rhythms resulting in deranged metabolism.

  18. Night myopia studied with an adaptive optics visual analyzer.

    Directory of Open Access Journals (Sweden)

    Pablo Artal

    Full Text Available PURPOSE: Eyes with distant objects in focus in daylight are thought to become myopic in dim light. This phenomenon, often called "night myopia" has been studied extensively for several decades. However, despite its general acceptance, its magnitude and causes are still controversial. A series of experiments were performed to understand night myopia in greater detail. METHODS: We used an adaptive optics instrument operating in invisible infrared light to elucidate the actual magnitude of night myopia and its main causes. The experimental setup allowed the manipulation of the eye's aberrations (and particularly spherical aberration as well as the use of monochromatic and polychromatic stimuli. Eight subjects with normal vision monocularly determined their best focus position subjectively for a Maltese cross stimulus at different levels of luminance, from the baseline condition of 20 cd/m(2 to the lowest luminance of 22 × 10(-6 cd/m(2. While subjects performed the focusing tasks, their eye's defocus and aberrations were continuously measured with the 1050-nm Hartmann-Shack sensor incorporated in the adaptive optics instrument. The experiment was repeated for a variety of controlled conditions incorporating specific aberrations of the eye and chromatic content of the stimuli. RESULTS: We found large inter-subject variability and an average of -0.8 D myopic shift for low light conditions. The main cause responsible for night myopia was the accommodation shift occurring at low light levels. Other factors, traditionally suggested to explain night myopia, such as chromatic and spherical aberrations, have a much smaller effect in this mechanism. CONCLUSIONS: An adaptive optics visual analyzer was applied to study the phenomenon of night myopia. We found that the defocus shift occurring in dim light is mainly due to accommodation errors.

  19. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  20. Cold-induced bradycardia in man during sleep in Arctic winter nights

    Science.gov (United States)

    Buguet, A. G. C.

    1987-03-01

    Two young male Caucasians volunteered for a study on the effects of cold exposure during night sleep in winter in the Arctic. The 14-day experiment was divided in three consecutive periods, baseline (2 nights), cold exposure (10 night) and recovery (2 nights). Both baseline and recovery data were obtained in neutral thermal conditions in a laboratory. The subjects slept in a sleeping bag under an unheated tent during the cold exposure. Apart from polysomnographic and body temperature recordings, electrocardiograms were taken through a telemetric system for safety purposes. Heart rates were noted at 5-min intervals and averaged hourly. In both environmental conditions, heart rate decreased within the first two hours of sleep. Comparison of the data obtained during cold exposure vs. thermal neutrality revealed lower values of heart rate in the cold, while body temperatures remained within normal range. This cold-induced bradycardia supervening during night sleep is discussed in terms of the occurrence of a vagal reflex preventing central blood pressure to rise.

  1. The Voices of Women in the Night: Veronica and Judith

    Directory of Open Access Journals (Sweden)

    Shirley Walker

    2017-06-01

    Full Text Available quite often leave the radio playing all night on the bedside table; my only company in an all too empty house. It shuts out the noises of the night: the cry of the great owl in the rain-forest trees, the scurrying of possums on the roof, or the rustle of the neighbourhood carpet snake, a beautiful multi-coloured python, slithering into or out of the roof-space. I’m used to him (or her. She’s harmless —just another presence in the night.

  2. Fixed or Rotating Night Shift Work Undertaken by Women: Implications for Fertility and Miscarriage.

    Science.gov (United States)

    Fernandez, Renae C; Marino, Jennifer L; Varcoe, Tamara J; Davis, Scott; Moran, Lisa J; Rumbold, Alice R; Brown, Hannah M; Whitrow, Melissa J; Davies, Michael J; Moore, Vivienne M

    2016-03-01

    This review summarizes the evidence concerning effects of night shift work on women's reproductive health, specifically difficulty in conceiving and miscarriage. We distinguish between fixed night shift and rotating night shift, as the population subgroups exposed, the social and biological mechanisms, and the magnitude of effects are likely to differ; of note, women working fixed night shift are known to have high tolerance for this schedule. We identified two relevant systematic reviews with meta-analyses and five additional studies. Night shift work may give rise to menstrual cycle disturbances, but effect sizes are imprecise. Endometriosis may be elevated in night shift workers, but evidence is only preliminary. Adequate data are lacking to assess associations between night shift work and infertility or time to pregnancy. The weight of evidence begins to point to working at night, whether in fixed or rotating shifts, as a risk factor for miscarriage. There are many methodological problems with this literature, with substantial variation in the definitions of night shift and schedule types making comparisons between studies difficult and pooling across studies questionable. Nevertheless, there appears to be grounds for caution and counselling where women have concerns about night shift work and their reproductive health. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  3. Mothers' night work and children's behavior problems.

    Science.gov (United States)

    Dunifon, Rachel; Kalil, Ariel; Crosby, Danielle A; Su, Jessica Houston

    2013-10-01

    Many mothers work in jobs with nonstandard schedules (i.e., schedules that involve work outside of the traditional 9-5, Monday through Friday schedule); this is particularly true for economically disadvantaged mothers. In the present article, we used longitudinal data from the Fragile Families and Child Wellbeing Survey (n = 2,367 mothers of children ages 3-5 years) to examine the associations between maternal nonstandard work and children's behavior problems, with a particular focus on mothers' night shift work. We employed 3 analytic strategies with various approaches to adjusting for observed and unobserved selection factors; these approaches provided an upper and lower bound on the true relationship between night shift work and children's behavior. Taken together, the results provide suggestive evidence for modest associations between exposure to maternal night shift work and higher levels of aggressive and anxious or depressed behavior in children compared with children whose mothers who are not working, those whose mothers work other types of nonstandard shifts, and, for aggressive behavior, those whose mothers work standard shifts.

  4. Night Shift Work, Genetic Risk, and Type 2 Diabetes in the UK Biobank.

    Science.gov (United States)

    Vetter, Céline; Dashti, Hassan S; Lane, Jacqueline M; Anderson, Simon G; Schernhammer, Eva S; Rutter, Martin K; Saxena, Richa; Scheer, Frank A J L

    2018-04-01

    To examine the effects of past and current night shift work and genetic type 2 diabetes vulnerability on type 2 diabetes odds. In the UK Biobank, we examined associations of current ( N = 272,214) and lifetime ( N = 70,480) night shift work exposure with type 2 diabetes risk (6,770 and 1,191 prevalent cases, respectively). For 180,704 and 44,141 unrelated participants of European ancestry (4,002 and 726 cases, respectively) with genetic data, we assessed whether shift work exposure modified the relationship between a genetic risk score (comprising 110 single-nucleotide polymorphisms) for type 2 diabetes and prevalent diabetes. Compared with day workers, all current night shift workers were at higher multivariable-adjusted odds for type 2 diabetes (none or rare night shifts: odds ratio [OR] 1.15 [95% CI 1.05-1.26]; some nights: OR 1.18 [95% CI 1.05-1.32]; and usual nights: OR 1.44 [95% CI 1.19-1.73]), except current permanent night shift workers (OR 1.09 [95% CI 0.93-1.27]). Considering a person's lifetime work schedule and compared with never shift workers, working more night shifts per month was associated with higher type 2 diabetes odds (8/month: OR 1.36 [95% CI 1.14-1.62]; P trend = 0.001). The association between genetic type 2 diabetes predisposition and type 2 diabetes odds was not modified by shift work exposure. Our findings show that night shift work, especially rotating shift work including night shifts, is associated with higher type 2 diabetes odds and that the number of night shifts worked per month appears most relevant for type 2 diabetes odds. Also, shift work exposure does not modify genetic risk for type 2 diabetes, a novel finding that warrants replication. © 2018 by the American Diabetes Association.

  5. Total and cause-specific mortality of U.S. nurses working rotating night shifts.

    Science.gov (United States)

    Gu, Fangyi; Han, Jiali; Laden, Francine; Pan, An; Caporaso, Neil E; Stampfer, Meir J; Kawachi, Ichiro; Rexrode, Kathryn M; Willett, Walter C; Hankinson, Susan E; Speizer, Frank E; Schernhammer, Eva S

    2015-03-01

    Rotating night shift work imposes circadian strain and is linked to the risk of several chronic diseases. To examine associations between rotating night shift work and all-cause; cardiovascular disease (CVD); and cancer mortality in a prospective cohort study of 74,862 registered U.S. nurses from the Nurses' Health Study. Lifetime rotating night shift work (defined as ≥3 nights/month) information was collected in 1988. During 22 years (1988-2010) of follow-up, 14,181 deaths were documented, including 3,062 CVD and 5,413 cancer deaths. Cox proportional hazards models estimated multivariable-adjusted hazard ratios (HRs) and 95% CIs. All-cause and CVD mortality were significantly increased among women with ≥5 years of rotating night shift work, compared to women who never worked night shifts. Specifically, for women with 6-14 and ≥15 years of rotating night shift work, the HRs were 1.11 (95% CI=1.06, 1.17) and 1.11 (95% CI=1.05, 1.18) for all-cause mortality and 1.19 (95% CI=1.07, 1.33) and 1.23 (95% CI=1.09, 1.38) for CVD mortality. There was no significant association between rotating night shift work and all-cancer mortality (HR≥15years=1.08, 95% CI=0.98, 1.19) or mortality of any individual cancer, with the exception of lung cancer (HR≥15years=1.25, 95% CI=1.04, 1.51). Women working rotating night shifts for ≥5 years have a modest increase in all-cause and CVD mortality; those working ≥15 years of rotating night shift work have a modest increase in lung cancer mortality. These results add to prior evidence of a potentially detrimental effect of rotating night shift work on health and longevity. Copyright © 2015 American Journal of Preventive Medicine. All rights reserved.

  6. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  7. The impact of sleep deprivation on surgeons' performance during night shifts.

    Science.gov (United States)

    Amirian, Ilda

    2014-09-01

    The median incidence of adverse events that may result in patient injury is a total of 9% of all in-hospital admissions. In order to reduce this high incidence initiatives are continuously worked on that can reduce the risk of patient harm during admission by strengthening hospital systems. However, the influence of physicians' shift work on the risk on adverse events in patients remains controversial. In the studies included in this PhD thesis we wished to examine the impact of sleep deprivation and circadian rhythm disturbances on surgeons' during night shifts. Further we wished to examine the impact sleep deprivation had on surgeons' performance as a measure of how patient safety would be affected. We found that sleep deprivation subjectively had an impact on the surgeons and that they were aware of the effect fatigue had on their work performance. As a result they applied different mechanisms to cope with fatigue. Attending surgeons felt that they had a better overview now, due to more experience and better skills, than when they were residents, despite the fatigue on night shifts. We monitored surgeons' performance during night shifts by laparoscopic simulation and cognitive tests in order to assess their performance; no deterioration was found when pre call values were compared to on call values. The surgeons were monitored prospectively for 4 days across a night shift in order to assess the circadian rhythm and sleep. We found that surgeons' circadian rhythm was affected by working night shifts and their sleep pattern altered, resembling that of shift workers on the post call day. We assessed the quality of admission in medical records as a measure of surgeons' performance, during day, evening and night hours and found no deterioration in the quality of night time medical records. However, consistent high errors were found in several categories. These findings should be followed up in the future with respect of clarifying mechanism and consequences for

  8. Assuring human operator alertness at night in power plants

    International Nuclear Information System (INIS)

    Moore-Ede, M.C.

    1988-01-01

    The human body is not designed for peak alertness and performance at night, nor is it well-equipped to cope with the frequent day-night inversions required by rotating shift work schedules. As a result, the human operator can become the weak link in a complex technological operation such as a nuclear power plant. The high degree of dependence on human operator vigilance, decision-making ability and performance that is required in nuclear power plant operations can conflict with the human sleepiness and error-proneness which naturally occur during the night shift or after extended periods without adequate sleep. An opportunity to address these problems has come from a series of major research advances in basic circadian physiology

  9. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  12. The shared circuits model (SCM): how control, mirroring, and simulation can enable imitation, deliberation, and mindreading.

    Science.gov (United States)

    Hurley, Susan

    2008-02-01

    Imitation, deliberation, and mindreading are characteristically human sociocognitive skills. Research on imitation and its role in social cognition is flourishing across various disciplines. Imitation is surveyed in this target article under headings of behavior, subpersonal mechanisms, and functions of imitation. A model is then advanced within which many of the developments surveyed can be located and explained. The shared circuits model (SCM) explains how imitation, deliberation, and mindreading can be enabled by subpersonal mechanisms of control, mirroring, and simulation. It is cast at a middle, functional level of description, that is, between the level of neural implementation and the level of conscious perceptions and intentional actions. The SCM connects shared informational dynamics for perception and action with shared informational dynamics for self and other, while also showing how the action/perception, self/other, and actual/possible distinctions can be overlaid on these shared informational dynamics. It avoids the common conception of perception and action as separate and peripheral to central cognition. Rather, it contributes to the situated cognition movement by showing how mechanisms for perceiving action can be built on those for active perception.;>;>The SCM is developed heuristically, in five layers that can be combined in various ways to frame specific ontogenetic or phylogenetic hypotheses. The starting point is dynamic online motor control, whereby an organism is closely attuned to its embedding environment through sensorimotor feedback. Onto this are layered functions of prediction and simulation of feedback, mirroring, simulation of mirroring, monitored inhibition of motor output, and monitored simulation of input. Finally, monitored simulation of input specifying possible actions plus inhibited mirroring of such possible actions can generate information about the possible as opposed to actual instrumental actions of others, and the

  13. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  14. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  15. Artificial light at night inhibits mating in a Geometrid moth

    NARCIS (Netherlands)

    van Geffen, Koert G.; van Eck, Emiel; de Boer, Rens A.; van Grunsven, Roy H.A.; Salis, Lucia; Berendse, Frank; Veenendaal, Elmar M.

    2015-01-01

    * Levels of artificial night lighting are increasing rapidly worldwide, subjecting nocturnal organisms to a major change in their environment. Many moth species are strongly attracted to sources of artificial night lighting, with potentially severe, yet poorly studied, consequences for development,

  16. Artificial light at night inhibits mating in a Geometrid moth

    NARCIS (Netherlands)

    Geffen, van K.G.; Eck, van E.; Boer, de R.; Grunsven, van R.H.A.; Salis, F.; Berendse, F.; Veenendaal, E.M.

    2015-01-01

    1.Levels of artificial night lighting are increasing rapidly worldwide, subjecting nocturnal organisms to a major change in their environment. Many moth species are strongly attracted to sources of artificial night lighting, with potentially severe, yet poorly studied, consequences for development,

  17. Timing of food intake during simulated night shift impacts glucose metabolism: A controlled study.

    Science.gov (United States)

    Grant, Crystal L; Coates, Alison M; Dorrian, Jillian; Kennaway, David J; Wittert, Gary A; Heilbronn, Leonie K; Pajcin, Maja; Della Vedova, Chris; Gupta, Charlotte C; Banks, Siobhan

    2017-01-01

    Eating during the night may increase the risk for obesity and type 2 diabetes in shift workers. This study examined the impact of either eating or not eating a meal at night on glucose metabolism. Participants underwent four nights of simulated night work (SW1-4, 16:00-10:00 h, night (NE; n = 4, meals; 07:00, 19:00 and 01:30 h) or not eating at night (NEN; n = 7, meals; 07:00 h, 09:30, 16:10 and 19:00 h) condition. Meal tolerance tests were conducted post breakfast on pre-night shift (PRE), SW4 and following return to day shift (RTDS), and glucose and insulin area under the curve (AUC) were calculated. Mixed-effects ANOVAs were used with fixed effects of condition and day, and their interactions, and a random effect of subject identifier on the intercept. Fasting glucose and insulin were not altered by day or condition. There were significant effects of day and condition × day (both p night (p = 0.040) and not eating at night (p = 0.006) conditions. Results in this small, healthy sample suggest that not eating at night may limit the metabolic consequences of simulated night work. Further study is needed to explore whether matching food intake to the biological clock could reduce the burden of type 2 diabetes in shift workers.

  18. Participatory Sustainability Approach to Value Capture-Based Urban Rail Financing in India through Deliberated Stakeholder Engagement

    Directory of Open Access Journals (Sweden)

    Satya Sai Kumar Jillella

    2015-06-01

    Full Text Available Increasingly, cities around the world are seeking innovative financial mechanisms to build rail transit projects. Land value capture (VC is a financing mechanism to fund urban rail transit. Often VC mechanisms are viewed only as a financing tool applied in relation to increased land values from the administration and legislation perspectives, without actively involving the community in the process. The lack of such participation has resulted in the under collection of the true value established. The transit beneficiary community and city tax payers are especially important stakeholders in this process as their willingness to participate is really critical to the overall VC success and transport outcome. This paper introduces a participatory sustainability approach to enable a more deliberated stakeholder engagement intervention across the VC life cycle. A four-step “Participatory Strategic Value Capture (PSVC” framework is proposed offering step-by-step guidance toward facilitating a meaningful stakeholder dialogue, deliberation, and collaboration around the stated engagement interests. The PSVC framework, applied to the proposed Bangalore sub-urban rail project in India, has demonstrated the importance of stakeholder engagement using deliberated participatory approaches from a win-win perspective.

  19. 46 CFR 9.5 - Night, Sunday, and holiday defined.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Night, Sunday, and holiday defined. 9.5 Section 9.5... COMPENSATION FOR OVERTIME SERVICES § 9.5 Night, Sunday, and holiday defined. (a) For the purpose of this part... term holiday shall mean only national legal public holidays, viz., January 1, February 22, May 30, July...

  20. Improvement of Hungarian Joint Terminal Attack Program

    Science.gov (United States)

    2013-06-13

    LST Laser Spot Tracker NVG Night Vision Goggle ROMAD Radio Operator Maintainer and Driver ROVER Remotely Operated Video Enhanced Receiver TACP...visual target designation. The other component consists of a laser spot tracker (LST), which identifies targets by tracking laser energy reflecting...capability for every type of night time missions, laser spot tracker for laser spot search missions, remotely operated video enhanced receiver

  1. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  2. Night shift work at specific age ranges and chronic disease risk factors.

    Science.gov (United States)

    Ramin, Cody; Devore, Elizabeth E; Wang, Weike; Pierre-Paul, Jeffrey; Wegrzyn, Lani R; Schernhammer, Eva S

    2015-02-01

    We examined the association of night shift work history and age when night shift work was performed with cancer and cardiovascular disease risk factors among 54 724 women in the Nurses' Health Study (NHS) II. We calculated age-adjusted and socioeconomic status-adjusted means and percentages for cancer and cardiovascular risk factors in 2009 across categories of night shift work history. We used multivariable-adjusted logistic regression to estimate odds ratios (ORs) and 95% CIs for key risk factors among 54 724 participants (72% ever shift workers). We further examined these associations by age (20-25, 26-35, 36-45 and 46+ years) at which shift work was performed. Ever night shift workers had increased odds of obesity (body mass index ≥30 kg/m(2); OR=1.37, 95% CI 1.31 to 1.43); higher caffeine intake (≥131 mg/day; OR=1.16, 95% CI 1.12 to 1.22) and total calorie intake (≥1715 kcal/day; OR=1.09, 95% CI 1.04 to 1.13); current smoking (OR=1.30, 95% CI 1.19 to 1.42); and shorter sleep durations (≤7 h of sleep/day; OR=1.19, 95% CI 1.15 to 1.24) compared to never night shift workers. These estimates varied depending on age at which night work was performed, with a suggestion that night shift work before age 25 was associated with fewer risk factors compared to night shift work at older ages. Our results indicate that night shift work may contribute to an adverse chronic disease risk profile, and that risk factors may vary depending on the age at which night shift work was performed. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  3. Clinical Effects of Yoga on Asthmatic Patients: A Preliminary Clinical ...

    African Journals Online (AJOL)

    There was statistically significant reduction in day and night asthma attacks in the yoga group. CONCLUSION: Yoga exercise among asthmatic patients resulted in a decreased number of day and night attacks and use of drugs. It also shows significant improvement in the peak expiratory flow rate. Further large scale study is ...

  4. Do wild great tits avoid exposure to light at night?

    NARCIS (Netherlands)

    De Jong, M.; Ouyang, Jenny; van Grunsven, Roy H. A.; Visser, M.E.; Spoelstra, K.

    2016-01-01

    Studies of wild populations have provided important insights into the effects of artificial light at night on organisms, populations and ecosystems. However, in most studies the exact amount of light at night individuals are exposed to remains unknown. Individuals can potentially control their

  5. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  6. Night shift work and stomach cancer risk in the MCC-Spain study.

    Science.gov (United States)

    Gyarmati, Georgina; Turner, Michelle C; Castaño-Vinyals, Gemma; Espinosa, Ana; Papantoniou, Kyriaki; Alguacil, Juan; Costas, Laura; Pérez-Gómez, Beatriz; Martin Sanchez, Vicente; Ardanaz, Eva; Moreno, Victor; Gómez-Acebo, Inés; Fernández-Tardon, Guillermo; Villanueva Ballester, Vicent; Capelo, Rocio; Chirlaque, Maria-Dolores; Santibáñez, Miguel; Pollán, Marina; Aragonés, Nuria; Kogevinas, Manolis

    2016-08-01

    Night shift work has been classified as a probable human carcinogen by the International Agency for Research on Cancer, based on experimental studies and limited evidence on human breast cancer risk. Evidence at other cancer sites is scarce. We evaluated the association between night shift work and stomach cancer risk in a population-based case-control study. A total of 374 incident stomach adenocarcinoma cases and 2481 population controls were included from the MCC-Spain study. Detailed data on lifetime night shift work were collected including permanent and rotating shifts, and their cumulative duration (years). Adjusted unconditional logistic regression models were used in analysis. A total of 25.7% of cases and 22.5% of controls reported ever being a night shift worker. There was a weak positive, non-significant association between ever having had worked for at least 1 year in permanent night shifts and stomach cancer risk compared to never having worked night shifts (OR=1.2, 95% CI 0.9 to 1.8). However, there was an inverse 'U' shaped relationship with cumulative duration of permanent night shifts, with the highest risk observed in the intermediate duration category (OR 10-20 years=2.0, 95% CI 1.1 to 3.6) (p for trend=0.19). There was no association with ever having had worked in rotating night shifts (OR=0.9, 95% CI 0.6 to 1.2) and no trend according to cumulative duration (p for trend=0.68). We found no clear evidence concerning an association between night shift work and stomach cancer risk. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  7. Circadian gene expression in peripheral blood leukocytes of rotating night shift nurses.

    Science.gov (United States)

    Reszka, Edyta; Peplonska, Beata; Wieczorek, Edyta; Sobala, Wojciech; Bukowska, Agnieszka; Gromadzinska, Jolanta; Lie, Jenny-Anne; Kjuus, Helge; Wasowicz, Wojciech

    2013-03-01

    It has been hypothesized that the underlying mechanism of elevated breast cancer risk among long-term, night-working women involves circadian genes expression alteration caused by exposure to light at night and/or irregular work hours. The aim of the present study was to determine the effect of rotating night shift work on expression of selected core circadian genes. The cross-sectional study was conducted on 184 matched nurses and midwives, who currently work either day or rotating night shifts, to determine the effect of irregular work at night on circadian gene expression in peripheral blood leukocytes. Transcript levels of BMAL1, CLOCK, CRY1, CRY2, PER1, PER2, and PER3 were determined by means of quantitative real-time polymerase chain reaction (PCR). After adjusting for hour of blood collection, there were no statistically significant changes of investigated circadian genes among nurses and midwives currently working rotating night shifts compared to nurses working day shifts. The highest expression of PER1 messenger ribonucleic acid (mRNA) was observed for women currently working shifts who had worked >15 years in rotating night shift work. PER1 gene expression was associated with the lifetime duration of rotating night shift work among women currently working night shifts (P=0.04). PER1 and PER3 transcript levels in blood leukocytes were significantly down-regulated in the later versus early hours of the morning between 06.00-10.00 hours (β-coefficient -0.226, P=0.001 and β-coefficient -0.181, Pnight shift work does not affect circadian gene expression in human circulating leukocytes. In analysis of the peripheral clock in human studies, the hour of blood collection should be precisely specified.

  8. A Decision Support Framework For Science-Based, Multi-Stakeholder Deliberation: A Coral Reef Example

    Science.gov (United States)

    We present a decision support framework for science-based assessment and multi-stakeholder deliberation. The framework consists of two parts: a DPSIR (Drivers-Pressures-States-Impacts-Responses) analysis to identify the important causal relationships among anthropogenic environ...

  9. Effects of age and illumination on night driving: a road test.

    Science.gov (United States)

    Owens, D Alfred; Wood, Joanne M; Owens, Justin M

    2007-12-01

    This study investigated the effects of drivers' age and low light on speed, lane keeping, and visual recognition of typical roadway stimuli. Poor visibility, which is exacerbated by age-related changes in vision, is a leading contributor to fatal nighttime crashes. There is little evidence, however, concerning the extent to which drivers recognize and compensate for their visual limitations at night. Young, middle-aged, and elder participants drove on a closed road course in day and night conditions at a "comfortable" speed without speedometer information. During night tests, headlight intensity was varied over a range of 1.5 log units using neutral density filters. Average speed and recognition of road signs decreased significantly as functions of increased age and reduced illumination. Recognition of pedestrians at night was significantly enhanced by retroreflective markings of limb joints as compared with markings of the torso, and this benefit was greater for middle-aged and elder drivers. Lane keeping showed nonlinear effects of lighting, which interacted with task conditions and drivers' lateral bias, indicating that older drivers drove more cautiously in low light. Consistent with the hypothesis that drivers misjudge their visual abilities at night, participants of all age groups failed to compensate fully for diminished visual recognition abilities in low light, although older drivers behaved more cautiously than the younger groups. These findings highlight the importance of educating all road users about the limitations of night vision and provide new evidence that retroreflective markings of the limbs can be of great benefit to pedestrians' safety at night.

  10. Melatonin treatment of pediatric residents for adaptation to night shift work.

    Science.gov (United States)

    Cavallo, Anita; Ris, M Douglas; Succop, Paul; Jaskiewicz, Julie

    2005-01-01

    Night float rotations are used in residency training programs to reduce residents' sleep deprivation. Night shift work, however, is accompanied by deleterious effects on sleep, mood, and attention. To test whether melatonin reduces the deleterious effects of night shift work on sleep, mood, and attention in pediatric residents during night float rotation. Double-blind, randomized, placebo-controlled crossover. Participants took melatonin (3 mg) or a placebo before bedtime in the morning after night shift; completed a sleep diary and an adverse-effects questionnaire daily; and completed the Profile of Mood States and the Conners Continuous Performance Test 3 times in each study week to test mood and attention, respectively. A university-affiliated, tertiary-care pediatric hospital. Healthy second-year pediatric residents working 2 night float rotations. Standardized measures of sleep, mood, and attention. Twenty-eight residents completed both treatments; 17 completed 1 treatment (10 placebo, 7 melatonin). There was not a statistically significant difference in measures of sleep, mood, and 5 of 6 measures of attention during melatonin and placebo treatment. One measure of attention, the number of omission errors, was significantly lower on melatonin (3.0 +/- 9.6) than on placebo (4.5 +/- 17.5) (z = -2.12, P = .03). The isolated finding of improvement of 1 single measure of attention in a test situation during melatonin treatment was not sufficiently robust to demonstrate a beneficial effect of melatonin in the dose used. Other strategies need to be considered to help residents in adaptation to night shift work.

  11. Disruption of Circadian Rhythms by Light During Day and Night.

    Science.gov (United States)

    Figueiro, Mariana G

    2017-06-01

    This study aims to discuss possible reasons why research to date has not forged direct links between light at night, acute melatonin suppression or circadian disruption, and risks for disease. Data suggest that irregular light-dark patterns or light exposures at the wrong circadian time can lead to circadian disruption and disease risks. However, there remains an urgent need to: (1) specify light stimulus in terms of circadian rather than visual response; (2) when translating research from animals to humans, consider species-specific spectral and absolute sensitivities to light; (3) relate the characteristics of photometric measurement of light at night to the operational characteristics of the circadian system; and (4) examine how humans may be experiencing too little daytime light, not just too much light at night. To understand the health effects of light-induced circadian disruption, we need to measure and control light stimulus during the day and at night.

  12. Global Night-Time Lights for Observing Human Activity

    Science.gov (United States)

    Hipskind, Stephen R.; Elvidge, Chris; Gurney, K.; Imhoff, Mark; Bounoua, Lahouari; Sheffner, Edwin; Nemani, Ramakrishna R.; Pettit, Donald R.; Fischer, Marc

    2011-01-01

    We present a concept for a small satellite mission to make systematic, global observations of night-time lights with spatial resolution suitable for discerning the extent, type and density of human settlements. The observations will also allow better understanding of fine scale fossil fuel CO2 emission distribution. The NASA Earth Science Decadal Survey recommends more focus on direct observations of human influence on the Earth system. The most dramatic and compelling observations of human presence on the Earth are the night light observations taken by the Defence Meteorological System Program (DMSP) Operational Linescan System (OLS). Beyond delineating the footprint of human presence, night light data, when assembled and evaluated with complementary data sets, can determine the fine scale spatial distribution of global fossil fuel CO2 emissions. Understanding fossil fuel carbon emissions is critical to understanding the entire carbon cycle, and especially the carbon exchange between terrestrial and oceanic systems.

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  14. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  15. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  16. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  17. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  18. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  19. Interference Control in Preschoolers: Factors Influencing Performance on the Day-Night Task

    Science.gov (United States)

    Montgomery, Derek E.; Anderson, Maren; Uhl, Elizabeth

    2008-01-01

    Two experiments investigated preschoolers' interference control in variants of the day-night task. The day-night task involves instructing children across 16 trials to say the word "day" when viewing a card depicting a nighttime sky and to say "night" when shown a picture of the daytime sky. The purpose of the experiments was to investigate…

  20. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.