WorldWideScience

Sample records for deliberate night attack

  1. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  2. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  3. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  4. Association of ambient air pollution and meteorological factors with primary care visits at night due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2013-09-01

    The association of outdoor air pollution and meteorological elements with primary care visits at night due to asthma attack was studied. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. The subjects were 956 children aged 0-14 years who visited the clinic with an asthma attack between the hours of 9 p.m. and 6 a.m. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and a number of meteorological elements were measured, and a conditional logistic regression model was used to estimate odds ratios (ORs) of primary care visits per unit increment of air pollutants or meteorological elements. The analyses took into consideration the effects of seasonality. Of the 956 children, 73 (7.6 %) were aged asthma attack at night in the spring or summer was found. An inverse relation between suspended particulate matter and primary care visits due to asthma attack was detected in the winter. ORs in the summer per degree increment in daily mean temperature was 1.31 [95 % confidential interval (CI) 1.09-1.56], and ORs in the autumn per hourly increment in daily hours of sunshine was 0.94 (95 % CI 0.90-0.99). The findings of our study fail to support any association between daily mean concentration of air pollutant and primary care visits at night. However, we did find evidence indicating that certain meteorological elements may be associated with primary care visits.

  5. Prasinovirus Attack of Ostreococcus Is Furtive by Day but Savage by Night.

    Science.gov (United States)

    Derelle, Evelyne; Yau, Sheree; Moreau, Hervé; Grimsley, Nigel H

    2018-02-15

    Prasinoviruses are large DNA viruses that infect diverse genera of green microalgae worldwide in aquatic ecosystems, but molecular knowledge of their life cycles is lacking. Several complete genomes of both these viruses and their marine algal hosts are now available and have been used to show the pervasive presence of these species in microbial metagenomes. We have analyzed the life cycle of Ostreococcus tauri virus 5 (OtV5), a lytic virus, using transcriptome sequencing (RNA-Seq) from 12 time points of healthy or infected Ostreococcus tauri cells over a day/night cycle in culture. In the day, viral gene transcription remained low while host nitrogen metabolism gene transcription was initially strongly repressed for two successive time points before being induced for 8 h, but during the night, viral transcription increased steeply while host nitrogen metabolism genes were repressed and many host functions that are normally reduced in the dark appeared to be compensated either by genes expressed from the virus or by increased expression of a subset of 4.4% of the host's genes. Some host cells underwent lysis progressively during the night, but a larger proportion were lysed the following morning. Our data suggest that the life cycles of algal viruses mirror the diurnal rhythms of their hosts. IMPORTANCE Prasinoviruses are common in marine environments, and although several complete genomes of these viruses and their hosts have been characterized, little is known about their life cycles. Here we analyze in detail the transcriptional changes occurring over a 27-h-long experiment in a natural diurnal rhythm, in which the growth of host cells is to some extent synchronized, so that host DNA replication occurs late in the day or early in the night and cell division occurs during the night. Surprisingly, viral transcription remains quiescent over the daytime, when the most energy (from light) is available, but during the night viral transcription activates, accompanied

  6. DAILY CHANGES OF CENTRAL HEMODYNAMICS IN PATIENTS WITH CHRONIC HEART FAILURE WITH NIGHT-TIME DYSPNOEA ATTACK

    Directory of Open Access Journals (Sweden)

    S. A. Dovgolis

    2006-01-01

    Full Text Available Aim. To study daily changes of central hemodynamics (CHD in patients with chronic heart failure (CHF and the effects of therapy. Materials and methods. 22 patients with ischemic heart disease and CHF of III-IV functional class (FC by NYHA, age 60,5±10,5 were observed. Patients were suffering from night-time dyspnoea attacks and had pulmonary artery occlusion pressure (PAOP 15-20 mm Hg. CHD was monitored invasively before the treatment and after 4 weeks of CHF treatment. Results. According to the cardiac index (CI at admission patients were split into two groups. 9 patients of group-I had CI ≤2,15 l\\min\\m2, and 13 patients of group-II had CI >2,15 l\\min\\m2. In patients of group-I CI increased in 4 weeks of treatment. The treatment caused considerable clinical improvement in all patients. The CHD indexes also improved. Initially evening-night-time peaks of PAOP (р≤0,002, systolic (SBP (р≤0,003, diastolic (DBP (р=0,002 and average (BPa (р=0,0007 blood pressure (BP as well as double multiplication (DM (р≤0,008 were registered in patients of group-I. At the end of treatment only evening-night increase in DBP (р=0,002 and BPa (р≤0,006 were noted. In patients of group-II after 4 weeks of treatment CI decreased or didn’t change. Towards 28-th day of treatment 10 patients had clinical improvements. Only one patient’s FC NYHA increased. At the end of treatment the normalization of CHD was registered totally in group. Initially evening-night-time peaks of PAOP (р≤0,002, SBP (р≤0, 0001, CI (р=0,057 and DM (р=0,084 were registered in patients of group-II. At the end of treatment evening-night-time peaks of PAOP (р≤0,015, SBP (р≤0,044, CI (р≤0,005 and DM (р≤0,044 still remained. Besides, evening-night-time peaks of cardiac output (р≤0,01 and systolic index (р≤0, 06 have added. Conclusion. In patients with CHF with initial CI ≤2,15 l\\min\\m2 treatment results in the normalization of CHD and its daily

  7. Deliberate honesty

    NARCIS (Netherlands)

    Bereby-Meyer, Y.; Shalvi, S.

    2015-01-01

    Studies on lying, especially on inhibiting honest responses and generating dishonest responses, suggest that honesty is the default behavior and dishonesty requires deliberate effort. Here, we argue that when lying serves self-interest, that is, when lying is tempting and lies are easy to craft,

  8. Exposure to air pollution and meteorological factors associated with children's primary care visits at night due to asthma attack: case-crossover design for 3-year pooled patients.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2015-05-03

    We examined the association of outdoor air pollution and meteorological parameters with primary care visits (PCVs) at night due to asthma attack. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. Participants were 1447 children aged 0-14 years who visited the clinic with an asthma attack from April 2010 until March 2013. Daily concentrations of air pollutants and meteorological parameters were measured. PCVs at night due to asthma attack. A conditional logistic regression model was used to estimate ORs of PCVs per unit increment of air pollutants or meteorological parameters (the per-unit increments of particulate matter with an aerodynamic diameter ≤2.5 µm (PM₂.₅) and ozone were 10 μg/m(3) and 10 ppb, respectively). Analyses took into consideration the effects of seasonality. We noted an association between PCVs and daily ozone levels on the day before a PCV (OR=1.17; 95% CI 1.01 to 1.35; p=0.04), as well as between PCVs and 3-day mean ozone levels before a PCV (OR=1.29; 95% CI 1.00 to 1.46; p=0.04), from April until June. We also observed an association between PCVs and daily PM₂.₅ levels on the day before a PCV from December until March (OR=1.16; 95% CI 1.01 to 1.33; p=0.05). Meteorological parameters, such as hours of sunshine from September until November, atmospheric pressure from April until June, and temperature from April until August, were also found to be associated with PCVs. The findings in the present study supported an association between ozone and PCVs and suggest that certain meteorological items may be associated with PCVs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  9. Voluntarism and transparent deliberation

    DEFF Research Database (Denmark)

    Steglich-Petersen, Asbjørn

    2006-01-01

    It is widely assumed that doxastic deliberation is transparent to the factual question of the truth of the proposition being considered for belief, and that this sets doxastic deliberation apart from practical deliberation. This feature is frequently invoked in arguments against doxastic voluntar......It is widely assumed that doxastic deliberation is transparent to the factual question of the truth of the proposition being considered for belief, and that this sets doxastic deliberation apart from practical deliberation. This feature is frequently invoked in arguments against doxastic...

  10. Deliberate Self Harm Behavior

    Directory of Open Access Journals (Sweden)

    Fatma Gul Helvaci Celik

    2017-06-01

    Full Text Available The deliberate self-harm behaviour which defined as attempting to own body resulting in tisue damage without conscious desire of peolple to die, is a major public health problem worldwide. The causes of deliberate self- harm, risk factors, the relationship between mental disorders and treatment strategies are not fully known. Deliberate self- harm can be observed together with psychiatric disorders such as borderline personality disorder, histrionic personality disorder, eating disorders and mood disorders. Also, deliberate self-harm must be distinguished from suicidal behavior. Psychologi-cal trauma has been suggested as a risk factor for deliberate self- harm behavior. Trauma and traumatic events have long been associated with deliberate self- harm behavior. The aim of this review article is to investigate the etiology and epidemiology of deliberate self-harm behaviour and relationship between psychiatric disorders. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2017; 9(2.000: 209-226

  11. Voluntarism and transparent deliberation

    DEFF Research Database (Denmark)

    Steglich-Petersen, Asbjørn

    2006-01-01

    voluntarism. I argue that transparency to factual questions occurs in practical deliberation in ways parallel to transparency in doxastic deliberation. I argue that this should make us reconsider the appeal to transparency in arguments against doxastic voluntarism, and the wider issue of distinguishing...... theoretical from practical rationality....

  12. WORKSHOP: Discussion, debate, deliberation

    NARCIS (Netherlands)

    Jeliazkova, Margarita I.

    2014-01-01

    Discussing, deliberating and debating are a core part of any democratic process. To organise these processes well, a great deal of knowledge and skill is required. It is not simple to find a good balance between a number of elements: appropriate language and terminology; paying attention to solid

  13. Designing Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2010-01-01

    the potential to revitalize and transform citizen engagement in democracy.  Although the majority of web 2.0 systems enable these discourses to some extent, government institutions commission and manage specialized deliberation systems (information systems designed to support participative discourse) intended...... to promote citizen engagement.  The most common examples of these are political discussion forums.  Though usually considered trivial adaptations of well-known technologies, these types of deliberative systems are often unsuccessful, and present a distinct set of design and management challenges.......  In this article we analyze the issues involved in establishing political deliberation systems under four headings: stakeholder engagement, web platform design, service management, political process re-shaping and evaluation and improvement.  We review the existing literature and present a longitudinal case study...

  14. Establishing Political Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2008-01-01

    The extension and transformation of political participation is dependent on widespread deliberation supported by information and communication technologies.  The most commonly found examples of these eParticipation systems are political discussion forums.  Though much of the discussion...... of these technologies is conducted in the eGovernment and (particularly) the eDemocracy literature, political discussion forums present a distinct set of design and management challenges which relate directly to IS concerns. In this article we analyze problems in establishing political deliberation systems under five...... headings: stakeholder engagement, web platform design, web platform management, political process re-shaping and evaluation and improvement. We review the existing literature and present a longitudinal case study of a political discussion forum: the Norwegian DemokratiTorget (Democracy Square).  We define...

  15. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  16. White Nights rebuts Pravda claims

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that another Russo-foreign joint venture under attack in the Moscow press has denied charges of impropriety and mismanagement in its operations. The White Nights joint venture last month came under scathing attack from Moscow newspaper Pravda, which alleged the venture has reneged on its promises, is virtually bankrupt, and mistreats Russian employees. White Nights is a joint venture owned 50% by Varyeganneftegaz (VNG), a Russian oil and gas enterprise, and 50% by Salomon Inc. unit Phibro Energy Inc., Greenwich, Conn., and Anglo-Suisse (U.S.S.R.) Ltd., a subsidiary of Anglo-Suisse Inc., Houston. The venture started operations Apr. 1, 1991, with a program of workovers, redevelopment, and horizontal wells in West Varyegan and Tagrinsk oil fields in western Siberia

  17. Sleeping position and reported night-time asthma symptoms and ...

    African Journals Online (AJOL)

    A 49 years old man, known case of bronchial asthma for 43 years, with history of frequent asthmatic attacks, usually responding to double dose of intravenous Aminophylline and double dose of Hydrocortisone was received at medical emergency care unit at midnight with night-time asthma attack. The attack did not settle ...

  18. Deliberating emission reduction options

    Energy Technology Data Exchange (ETDEWEB)

    Dowd, A. M.; Rodriguez, M.; Jeanneret, T. [Commonwealth Scientific and Industrial Research Organisation CSIRO, 37 Graham Rd, Highett VIC 3190 (Australia); De Best-Waldhober, M.; Straver, K.; Mastop, J.; Paukovic, M. [Energy research Centre of the Netherlands ECN, Policy Studies, Amsterdam (Netherlands)

    2012-06-15

    evaluate and choose between several options tend to lead to pseudo-opinions, incorrect assumptions and isolated responses. In order to address these methodological issues, researchers in the Netherlands created an Information Choice Questionnaire (ICQ). The ICQ provides the respondent with: (1) the entire (complex) policy problem, (2) expert information that is independent and balanced, (3) in a way that is understandable for the general public, (4) is a comparative process, and (5) asks for an evaluation. The aim of this research was to develop an online decision guide to aid public awareness, knowledge, deliberation and choice around carbon dioxide capture and storage (CCS) compared with other greenhouse gas mitigation options. More specifically, the objectives were to: (a) compare the Australian survey results to Dutch respondents; and (b) examine the most effective way to make online information and opinion formation more interactive and engaging. The following research questions are addressed: (1) How do Australian opinions on energy options differ from the Dutch when measured using the ICQ? ; (2) Is it possible to enhance the quality of the original ICQ by making the questionnaire an interactive application?.

  19. Deliberating emission reduction options

    Energy Technology Data Exchange (ETDEWEB)

    Dowd, A.M.; Rodriguez, M.; Jeanneret, T. [Commonwealth Scientific and Industrial Research Organisation CSIRO, 37 Graham Rd, Highett VIC 3190 (Australia); De Best-Waldhober, M.; Straver, K.; Mastop, J.; Paukovic, M. [Energy research Centre of the Netherlands ECN, Policy Studies, Amsterdam (Netherlands)

    2012-06-15

    participants to evaluate and choose between several options tend to lead to pseudo-opinions, incorrect assumptions and isolated responses. In order to address these methodological issues, researchers in the Netherlands created an Information Choice Questionnaire (ICQ). The ICQ provides the respondent with: (1) the entire (complex) policy problem, (2) expert information that is independent and balanced, (3) in a way that is understandable for the general public, (4) is a comparative process, and (5) asks for an evaluation. The aim of this research was to develop an online decision guide to aid public awareness, knowledge, deliberation and choice around carbon dioxide capture and storage (CCS) compared with other greenhouse gas mitigation options. More specifically, the objectives were to: (a) compare the Australian survey results to Dutch respondents; and (b) examine the most effective way to make online information and opinion formation more interactive and engaging. The following research questions are addressed: (1) How do Australian opinions on energy options differ from the Dutch when measured using the ICQ? ; (2) Is it possible to enhance the quality of the original ICQ by making the questionnaire an interactive application?.

  20. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  1. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  2. Deliberate change without hierarchical influence?

    DEFF Research Database (Denmark)

    Nørskov, Sladjana; Kesting, Peter; Ulhøi, John Parm

    2017-01-01

    reveals that deliberate change is indeed achievable in a non-hierarchical collaborative OSS community context. However, it presupposes the presence and active involvement of informal change agents. The paper identifies and specifies four key drivers for change agents’ influence. Originality....../value The findings contribute to organisational analysis by providing a deeper understanding of the importance of leadership in making deliberate change possible in non-hierarchical settings. It points to the importance of “change-by-conviction”, essentially based on voluntary behaviour. This can open the door...

  3. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  4. How deliberation makes better citizens

    DEFF Research Database (Denmark)

    Hansen, Kasper Møller; Normann Andersen, Vibeke

    2007-01-01

    This article presents results from a Danish national Deliberative Poll on the single European currency. A representative sample of 364 Danish citizens assembled to deliberate on Denmark's participation in the single currency. As a quasi-experiment, the Deliberative Poll is an example of deliberat...... emphasizes the need for further elaboration of the theory of deliberative democracy so that it better reflects these features of ‘real-life' politics....

  5. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  6. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  7. Deliberate self harm in children.

    Science.gov (United States)

    Krishnakumar, P; Geeta, M G; Riyaz, A

    2011-05-01

    To study the nature of deliberate self-harm (DSH) in children and to identify the associated factors. Child Guidance Clinic attached to the Department of Pediatrics of a teaching hospital in South India. Children with history of deliberate self harm who were referred to the CGC for psychological evaluation during a 10 year period. Children and parents were interviewed together and separately and details regarding age, sex, family and school environment, stresses and nature of self harm were documented. Psychiatric diagnosis was made based on DSM IV diagnostic criteria. Among the 30 children included in the study, 21 were boys and 9 were girls. Majority of children were between the ages of 11 and 13 years, the youngest being 6 years old. 76%of children had history of acute stressful life events and 62%of them had chronic ongoing stress. 62%of children had stress in the family and 41%had stress at school. Stress in the family included death of a parent, conflicts with parents or siblings, mental illness in the family, parental alcoholism and parental disharmony. Stress at school included conflicts with classmates, punishment or negative comments by teachers and learning problems. Psychiatric disorders were present in 52%of children, the commonest being depressive disorder. The commonest mode of DSH was self poisoning, and rat poison (zinc phosphide) was the commonest substance used. Deliberate self harm occurs in young children and the risk factors are comparable to those in adolescents.

  8. On the security of Y-00 under fast correlation and other attacks on the key

    Science.gov (United States)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  9. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  10. Tax Salience, Voting, and Deliberation

    DEFF Research Database (Denmark)

    Sausgruber, Rupert; Tyran, Jean-Robert

    Tax incentives can be more or less salient, i.e. noticeable or cognitively easy to process. Our hypothesis is that taxes on consumers are more salient to consumers than equivalent taxes on sellers because consumers underestimate the extent of tax shifting in the market. We show that tax salience...... biases consumers' voting on tax regimes, and that experience is an effective de-biasing mechanism in the experimental laboratory. Pre-vote deliberation makes initially held opinions more extreme rather than correct and does not eliminate the bias in the typical committee. Yet, if voters can discuss...... their experience with the tax regimes they are less likely to be biased....

  11. Public deliberation in municipal planning

    DEFF Research Database (Denmark)

    Bohøj, Morten; Borchorst, Nikolaj Gandrup; Bødker, Susanne

    2011-01-01

    This paper reports on an exploratory participatory design process aimed at supporting citizen deliberation in municipal planning. It presents the main outcomes of this process in terms of selected prototypes and an approach to the use setting. We support and discuss different ways for citizens...... to act and reflect on proposed plans: in-situ, while physically close to the planning object, and ex-situ, when citizens are remote from this. The support of in-situ and ex-situ participation allows citizens to engage in continuous reflection-in and on-action as a collaborative activity with other...

  12. Online Public Deliberation in China

    DEFF Research Database (Denmark)

    Medaglia, Rony; Yang, Yang

    2017-01-01

    Internet discussion platforms in China provide a hugely interesting and relevant source for understanding dynamics of online discussions in a unique context. Adopting the theoretical lens of public deliberation, this paper investigates the evolution of patterns of similar-minded and different......-minded interactions over time on a Chinese online discussion forum. We analyse the content and reply networks of 18,000+ messages on four highly debated topics on the Bulletin Board System (BBS) platform Tianya. Findings provide nuanced evidence to the phenomenon of increased network homophily over time, mitigated...... investigation on independent variables for understanding dynamics of online discussions, and for studies comparing cases across different contexts....

  13. Nightmares and Night Terrors

    Science.gov (United States)

    ... able to tell you what happened in the dream and why it was scary. Your child may have trouble going back to sleep. Your child might have the same dream again on other nights. What are night terrors? ...

  14. Aims and harvest of moral case deliberation.

    Science.gov (United States)

    Weidema, Froukje C; Molewijk, Bert A C; Kamsteeg, Frans; Widdershoven, Guy A M

    2013-09-01

    Deliberative ways of dealing with ethical issues in health care are expanding. Moral case deliberation is an example, providing group-wise, structured reflection on dilemmas from practice. Although moral case deliberation is well described in literature, aims and results of moral case deliberation sessions are unknown. This research shows (a) why managers introduce moral case deliberation and (b) what moral case deliberation participants experience as moral case deliberation results. A responsive evaluation was conducted, explicating moral case deliberation experiences by analysing aims (N = 78) and harvest (N = 255). A naturalistic data collection included interviews with managers and evaluation questionnaires of moral case deliberation participants (nurses). From the analysis, moral case deliberation appeals for cooperation, team bonding, critical attitude towards routines and nurses' empowerment. Differences are that managers aim to foster identity of the nursing profession, whereas nurses emphasize learning processes and understanding perspectives. We conclude that moral case deliberation influences team cooperation that cannot be controlled with traditional management tools, but requires time and dialogue. Exchanging aims and harvest between manager and team could result in co-creating (moral) practice in which improvements for daily cooperation result from bringing together perspectives of managers and team members.

  15. Adnyamathanha Night Skies

    Science.gov (United States)

    Curnow, Paul

    2009-06-01

    Aboriginal Australians have been viewing the night skies of Australia for some 45,000 years and possibly much longer. During this time they have been able to develop a complex knowledge of the night sky, the terrestrial environment in addition to seasonal changes. However, few of us in contemporary society have an in-depth knowledge of the nightly waltz of stars above.

  16. [THE FORMS OF DELIBERATION INVOLVED IN THE FIELD OF BIOETHICS: TECHNIQUE DELIBERATION AND ETHICS DELIBERATION].

    Science.gov (United States)

    Neves Pinto, Gerson

    2015-12-01

    In this article the author examines the formulation of the problem of new technologies with their ethical limits and legal. To do this, in a first it is d'assess the contribuitions of the two most important contemporary philosophers who have treated this subject: Jürgen Habermas and Ronald Dworkin, while trying to put them into dialog with the one who has been one of the founders of l'classic ethics: Aristotle. Then, it tries to answer the question of how could we understand this notion that Dworkin nome "moral dislocation" between the random and the choice or well, as the appointed Habermas, "l'extension of the contingency". Finally, we questioned how the Aristotelian distinction between the technical deliberation and deliberative ethical-moral can contribute to a better understanding of the questions on the decisions and choices that will make the moral agents (such as patients or the judges), as well as those relating to the type of deliberation technique chosen by the doctor or by the health professional.

  17. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  18. Diagnosing night sweats.

    Science.gov (United States)

    Viera, Anthon J; Bond, Michael M; Yates, Scott W

    2003-03-01

    Night sweats are a common outpatient complaint, yet literature on the subject is scarce. Tuberculosis and lymphoma are diseases in which night sweats are a dominant symptom, but these are infrequently found to be the cause of night sweats in modern practice. While these diseases remain important diagnostic considerations in patients with night sweats, other diagnoses to consider include human immunodeficiency virus, gastroesophageal reflux disease, obstructive sleep apnea, hyperthyroidism, hypoglycemia, and several less common diseases. Antihypertensives, antipyretics, other medications, and drugs of abuse such as alcohol and heroin may cause night sweats. Serious causes of night sweats can be excluded with a thorough history, physical examination, and directed laboratory and radiographic studies. If a history and physical do not reveal a possible diagnosis, physicians should consider a purified protein derivative, complete blood count, human immunodeficiency virus test, thyroid-stimulating hormone test, erythrocyte sedimentation rate evaluation, chest radiograph, and possibly chest and abdominal computed tomographic scans and bone marrow biopsy.

  19. Night Terrors in Children

    OpenAIRE

    Feferman, Irv

    1988-01-01

    Night terrors are a bizarre sleep disorder that affects young children. The child partially awakes during the night agitated, afraid and terrified, and cannot be consoled. These events, which may be related to emotional turmoil, are self-limiting. Psychiatric evaluation is indicated in certain cases, and drug therapy is almost never necessary. Parents should be reassured that night terrors are not dangerous and do not reflect any serious pathology.

  20. Tragedy in moral case deliberation.

    Science.gov (United States)

    Spronk, Benita; Stolper, Margreet; Widdershoven, Guy

    2017-09-01

    In healthcare practice, care providers are confronted with tragic situations, in which they are expected to make choices and decisions that can have far-reaching consequences. This article investigates the role of moral case deliberation (MCD) in dealing with tragic situations. It focuses on experiences of care givers involved in the treatment of a pregnant woman with a brain tumour, and their evaluation of a series of MCD meetings in which the dilemmas around care were discussed. The study was qualitative, focusing on the views and experiences of the participants. A case study design is used by conducting semi-structured interviews (N = 10) with health care professionals who both played a role in the treatment of the patient and attended the MCD. The results show that MCD helps people to deal with tragic situations. An important element of MCD in this respect is making explicit the dilemma and the damage, demonstrating that there is no simple solution. MCD prompts participants to formulate and share personal experiences with one another and thus helps to create a shared perception of the situation as tragic. The article concludes that MCD contributes to the sharing of tragic experiences, and fosters mutual interaction during a tragedy. Its value could be increased through explicit reflection on the aspect of contingency that characterises tragedy.

  1. Seeking Deliberation on the Unborn in International Law

    Directory of Open Access Journals (Sweden)

    SA de Freitas

    2011-08-01

    Full Text Available International human rights instruments and jurisprudence radiate an understanding of international law as also serving to protect fundamental rights and the interests of the individual. The idea that human rights provide a credible framework for constructing common norms among nations and across cultures is both powerful and attractive. If the protection of being human serves as the common denominator in human rights discussion, and if human rights are deeply inclusive, despite being culturally and historically diverse, then a failure to deliberate on the legal status and protection of the unborn may be seen as a failure to extend respect where it is due. Such deliberation is required, irrespective of the fact that jurisprudential debate on the unborn and on abortion is complex and controversial. The protection of human life, well-being, and dignity are essential aims of the United Nations Charter and the international system created to implement it. Although there have been collective efforts resulting in substantial development in international human rights law, the international community has not approached the legal status and protection of the unborn as a matter of urgency – this, while much has been accomplished regarding women, children, animals and cloning. This article therefore argues for the development of a deliberative framework so as to further the recognition (not necessarily in an absolute sense of the unborn in international law, bearing in mind that opposition to abortion does not of itself constitute an attack on a woman's right to respect for privacy in her life. The article also sets out what such deliberation on the legal status and protection of the unborn entails, against the background of a procedurally-rational approach.

  2. Homo Ignorans: Deliberately Choosing Not to Know.

    Science.gov (United States)

    Hertwig, Ralph; Engel, Christoph

    2016-05-01

    Western history of thought abounds with claims that knowledge is valued and sought. Yet people often choose not to know. We call the conscious choice not to seek or use knowledge (or information) deliberate ignorance. Using examples from a wide range of domains, we demonstrate that deliberate ignorance has important functions. We systematize types of deliberate ignorance, describe their functions, discuss their normative desirability, and consider how they can be modeled. To date, psychologists have paid relatively little attention to the study of ignorance, let alone the deliberate kind. Yet the desire not to know is no anomaly. It is a choice to seek rather than reduce uncertainty whose reasons require nuanced cognitive and economic theories and whose consequences-for the individual and for society-require analyses of both actor and environment. © The Author(s) 2016.

  3. Night Terrors (For Parents)

    Science.gov (United States)

    ... you tried. A night terror is a sleep disruption that seems similar to a nightmare , but is ... to: reduce your child's stress create a bedtime routine that's simple and relaxing make sure your child ...

  4. Night Rover Challenge

    Data.gov (United States)

    National Aeronautics and Space Administration — The objective of the Night Rover Challenge was to foster innovations in energy storage technology. Specifically, this challenge asked competitors to create an energy...

  5. Night Eating Disorders

    OpenAIRE

    Deniz Tuncel; Fatma Özlem Orhan

    2009-01-01

    Hunger is an awakening related biological impulse. The relationship between hunger and sleep is moderated by the control of homeostatic and circadian rhytms of the body. Abnormal eating behavior during sleep period could result from different causes. Abnormal eating during the main sleep period has been categorized as either night eating syndrome or sleep related eating disorder. Night eating syndrome (NES) is an eating disorder characterised by the clinical features of morning anorexia, even...

  6. History of the Night

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The definition of the night, as the period between sunset and sunrise, is consistent and unalterable, regardless of culture and time. However the perception of the night and its economic, social, and cultural roles are subject to change. Which parameters determine these changes? What can we learn by studying them about the specific character of a culture? Why do people experience the night in different ways in different historical periods and how did this affect their lives? How do references to nocturnal activities in historical sources (works of art, narratives) reveal what the artists/authors wish to communicate to their audiences? Can the night be a meaningful subject of historical and archaeological enquiry? A study of the source material in the Greek world (ca. 400 BC-ca. AD 400) shows a continuous effort to colonize the night with activities of the day, to make the night safer, more productive, more rational, more efficient. The main motors for this change were social developments and religion, no...

  7. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  8. Intuition, deliberation, and the evolution of cooperation.

    Science.gov (United States)

    Bear, Adam; Rand, David G

    2016-01-26

    Humans often cooperate with strangers, despite the costs involved. A long tradition of theoretical modeling has sought ultimate evolutionary explanations for this seemingly altruistic behavior. More recently, an entirely separate body of experimental work has begun to investigate cooperation's proximate cognitive underpinnings using a dual-process framework: Is deliberative self-control necessary to reign in selfish impulses, or does self-interested deliberation restrain an intuitive desire to cooperate? Integrating these ultimate and proximate approaches, we introduce dual-process cognition into a formal game-theoretic model of the evolution of cooperation. Agents play prisoner's dilemma games, some of which are one-shot and others of which involve reciprocity. They can either respond by using a generalized intuition, which is not sensitive to whether the game is one-shot or reciprocal, or pay a (stochastically varying) cost to deliberate and tailor their strategy to the type of game they are facing. We find that, depending on the level of reciprocity and assortment, selection favors one of two strategies: intuitive defectors who never deliberate, or dual-process agents who intuitively cooperate but sometimes use deliberation to defect in one-shot games. Critically, selection never favors agents who use deliberation to override selfish impulses: Deliberation only serves to undermine cooperation with strangers. Thus, by introducing a formal theoretical framework for exploring cooperation through a dual-process lens, we provide a clear answer regarding the role of deliberation in cooperation based on evolutionary modeling, help to organize a growing body of sometimes-conflicting empirical results, and shed light on the nature of human cognition and social decision making.

  9. Deliberation as Communication Instruction: A Study of a Climate Change Deliberation in an Introductory Biology Course

    Science.gov (United States)

    Drury, Sara A. Mehltretter

    2015-01-01

    The author argues that deliberation is an innovative method for teaching communication skills, particularly group communication, in the undergraduate science, technology, engineering, and math (STEM) curriculum. A case study using a deliberation activity on global climate change in an introductory biology course demonstrates how deliberative…

  10. A Midsummer Night's Science

    CERN Multimedia

    2001-01-01

    Last year, the first Science Night attracted nearly 1500 people. Dipping into history for the space of one night? This is the idea of Geneva's Museum of the History of Science, which is organizing its second Science Night, on 7 and 8 July, on the history of science. The first such event, held last year, was a considerable success with almost 15 000 visitors. The second Science Night, to be held in the magnificent setting of the Perle du Lac Park in Geneva, promises to be a winner too. By making science retell its own history, this major event is intended to show how every scientific and technical breakthrough is the culmination of a long period of growth that began hundreds of years in the past. Dozens of activities and events are included in this programme of time travel: visitors can study the night sky through telescopes and see what Galileo first observed, and then go to see a play on the life of the Italian scientist. Another play, commissioned specially for the occasion, will honour Geneva botanist De ...

  11. Freedom of Expression, Deliberation, Autonomy and Respect

    DEFF Research Database (Denmark)

    Rostbøll, Christian F.

    2011-01-01

    This paper elaborates on the deliberative democracy argument for freedom of expression in terms of its relationship to different dimensions of autonomy. It engages the objection that Enlightenment theories pose a threat to cultures that reject autonomy and argues that autonomy-based democracy...... is not only compatible with but necessary for respect for cultural diversity. On the basis of an intersubjective epistemology, it argues that people cannot know how to live on mutually respectful terms without engaging in public deliberation and develop some degree of personal autonomy. While freedom...... of expression is indispensable for deliberation and autonomy, this does not mean that people have no obligations regarding how they speak to each other. The moral insights provided by deliberation depend on the participants in the process treating one another with respect. The argument is related to the Danish...

  12. Bringing values and deliberation to science communication.

    Science.gov (United States)

    Dietz, Thomas

    2013-08-20

    Decisions always involve both facts and values, whereas most science communication focuses only on facts. If science communication is intended to inform decisions, it must be competent with regard to both facts and values. Public participation inevitably involves both facts and values. Research on public participation suggests that linking scientific analysis to public deliberation in an iterative process can help decision making deal effectively with both facts and values. Thus, linked analysis and deliberation can be an effective tool for science communication. However, challenges remain in conducting such process at the national and global scales, in enhancing trust, and in reconciling diverse values.

  13. Airborne Use of Night Vision Systems

    Science.gov (United States)

    Mepham, S.

    1990-04-01

    Mission Management Department of the Royal Aerospace Establishment has won a Queen's Award for Technology, jointly with GEC Sensors, in recognition of innovation and success in the development and application of night vision technology for fixed wing aircraft. This work has been carried out to satisfy the operational needs of the Royal Air Force. These are seen to be: - Operations in the NATO Central Region - To have a night as well as a day capability - To carry out low level, high speed penetration - To attack battlefield targets, especially groups of tanks - To meet these objectives at minimum cost The most effective way to penetrate enemy defences is at low level and survivability would be greatly enhanced with a first pass attack. It is therefore most important that not only must the pilot be able to fly at low level to the target but also he must be able to detect it in sufficient time to complete a successful attack. An analysis of the average operating conditions in Central Europe during winter clearly shows that high speed low level attacks can only be made for about 20 per cent of the 24 hours. Extending this into good night conditions raises the figure to 60 per cent. Whilst it is true that this is for winter conditions and in summer the situation is better, the overall advantage to be gained is clear. If our aircraft do not have this capability the potential for the enemy to advance his troops and armour without hinderance for considerable periods is all too obvious. There are several solutions to providing such a capability. The one chosen for Tornado GR1 is to use Terrain Following Radar (TFR). This system is a complete 24 hour capability. However it has two main disadvantages, it is an active system which means it can be jammed or homed into, and is useful in attacking pre-planned targets. Second it is an expensive system which precludes fitting to other than a small number of aircraft.

  14. Night-Time Light Dynamics during the Iraqi Civil War

    Directory of Open Access Journals (Sweden)

    Xi Li

    2018-06-01

    Full Text Available In this study, we analyzed the night-time light dynamics in Iraq over the period 2012–2017 by using Visible Infrared Imaging Radiometer Suite (VIIRS monthly composites. The data quality of VIIRS images was improved by repairing the missing data, and the Night-time Light Ratio Indices (NLRIs, derived from urban extent map and night-time light images, were calculated for different provinces and cities. We found that when the Islamic State of Iraq and Syria (ISIS attacked or occupied a region, the region lost its light rapidly, with the provinces of Al-Anbar, At-Ta’min, Ninawa, and Sala Ad-din losing 63%, 73%, 88%, and 56%, of their night-time light, respectively, between December 2013 and December 2014. Moreover, the light returned after the Iraqi Security Forces (ISF recaptured the region. In addition, we also found that the night-time light in the Kurdish Autonomous Region showed a steady decline after 2014, with the Arbil, Dihok, and As-Sulaymaniyah provinces losing 47%, 18%, and 31% of their night-time light between December 2013 and December 2016 as a result of the economic crisis in the region. The night-time light in Southern Iraq, the region controlled by Iraqi central government, has grown continuously; for example, the night-time light in Al Basrah increased by 75% between December 2013 and December 2017. Regions formerly controlled by ISIS experienced a return of night-time light during 2017 as the ISF retook almost all this territory in 2017. This indicates that as reconstruction began, electricity was re-supplied in these regions. Our analysis shows the night-time light in Iraq is directly linked to the socioeconomic dynamics of Iraq, and demonstrates that the VIIRS monthly night-time light images are an effective data source for tracking humanitarian disasters in that country.

  15. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  16. Informal and Deliberate Learning with New Technologies

    Science.gov (United States)

    Trinder, Ruth

    2017-01-01

    Due to the ready availability of new technologies, opportunities for the incidental as well as deliberate practice of English have multiplied and far exceed what can be done in more formal environments. Yet, despite the sizeable literature on the classroom-based use of specific digital resources, few studies have investigated how students evaluate…

  17. Deliberate Evolution in Multi-Agent Systems

    NARCIS (Netherlands)

    Brazier, F.M.; Jonker, C.M.; Treur, J.; Wijngaards, N.J.E.; Gabbay, D.

    2001-01-01

    Evolution in societies of agents is a challenging phenomenon, both from a fundamental perspective and from an applied perspective. In the literature often genetic programming approaches are used and relatively simple agents are considered, which have no deliberate influence on the direction of the

  18. Night Eating Disorders

    Directory of Open Access Journals (Sweden)

    Deniz Tuncel

    2009-08-01

    Full Text Available Hunger is an awakening related biological impulse. The relationship between hunger and sleep is moderated by the control of homeostatic and circadian rhytms of the body. Abnormal eating behavior during sleep period could result from different causes. Abnormal eating during the main sleep period has been categorized as either night eating syndrome or sleep related eating disorder. Night eating syndrome (NES is an eating disorder characterised by the clinical features of morning anorexia, evening hyperphagia, and insomnia with awakenings followed by nocturnal food ingestion. Recently night eating syndrome, conceptualized as a delayed circadian intake of food. Sleep-related eating disorder, thought to represent a parasomnia and as such included within the revised International Classification of Sleep Disorders (ICSD-2, and characterized by nocturnal partial arousals associated with recurrent episodes of involuntary food consumption and altered levels of consciousness. Whether, however, sleep-related eating disorder and night eating syndrome represent different diseases or are part of a continuum is still debated. This review summarizes their characteristics, treatment outcomes and differences between them.

  19. "Twelfth Night" for Kids.

    Science.gov (United States)

    Burdett, Lois; Coburn, Christine

    Aimed at primary-age children, this book brings William Shakespeare's "Twelfth Night" to them, recognizing that children, properly guided, will take to Shakespeare's characters and stories like "ducks to water"; in the process they find their inner voices, they collaborate, they improvise, and they communicate. Illustrated with…

  20. A night sky model.

    Science.gov (United States)

    Erpylev, N. P.; Smirnov, M. A.; Bagrov, A. V.

    A night sky model is proposed. It includes different components of light polution, such as solar twilight, moon scattered light, zodiacal light, Milky Way, air glow and artificial light pollution. The model is designed for calculating the efficiency of astronomical installations.

  1. Jupiter Night and Day

    Science.gov (United States)

    2001-01-01

    Day and night side narrow angle images taken on January 1, 2001 illustrating storms visible on the day side which are the sources of visible lightning when viewed on the night side. The images have been enhanced in contrast. Note the two day-side occurrences of high clouds, in the upper and lower parts of the image, are coincident with lightning storms seen on the darkside. The storms occur at 34.5 degrees and 23.5 degrees North latitude, within one degree of the latitudes at which similar lightning features were detected by the Galileo spacecraft. The images were taken at different times. The storms' longitudinal separation changes from one image to the next because the winds carrying them blow at different speeds at the two latitudes.

  2. Travelers In The Night

    Science.gov (United States)

    Grauer, Albert D.

    2014-11-01

    Travelers In The Night is an engaging and informative series of two minute radio programs about asteroids, comets, spacecraft, and other objects in space. The pieces are evergreen in that they are current but not dated. They are published on the Public Radio Exchange and carried by a number of radio stations. For teachers, students, and kids of all ages, the script for each piece and the start of a path for further inquiry can be found on the website travelersinthenight.org . The Travelers InThe Night Pieces are written and produced by an observing member of the Catalina Sky Survey Team at the University of Arizona. DPS members are encouraged to submit program ideas which can be developed to feature their research efforts.

  3. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  4. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  5. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  6. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  7. Freedom of Expression, Deliberation, Autonomy, and Respect

    DEFF Research Database (Denmark)

    Rostbøll, Christian Fogh

    for freedom of expression in terms of its relationship to different dimensions of autonomy. In response to the objection that Enlightenment theories pose a threat to cultures that reject autonomy, it is argued that autonomy-based democracy is not only compatible with but necessary for respect for cultural......The strongest versions of the democracy argument for freedom of expression rely on the deliberative conception of democracy. Deliberative democracy entails both an ideal of political autonomy and of autonomous preference formation. This paper elaborates the deliberative democracy argument...... diversity. On the basis of an intersubjective epistemology, I argue that citizens cannot know how to live on mutually respectful terms without engaging in public deliberation. Moreover, to be successful deliberation must foster some degree of personal autonomy, at least the ability to distinguish what...

  8. Post Rio Communication Styles for Deliberation

    DEFF Research Database (Denmark)

    Holm, Jesper; Almlund, Pernille

    2015-01-01

    The communicative turn in planning, multi-layered governance and governmentality are analytical concepts from various schools of thought to comprehend the emergence of new types of publicprivate politics when it comes to complex, wicked issues such as sustainability or the 3rd wave of public health......: health promotion. The paper explores a research approach to compare two different policy communication tracks in order to conceive various impacts on deliberation. The tracks are constructed along the narratives individual-collective & consensus-conflictual in the discursive framing of political...... communication. We build on an ANT inspired methodology and look into two simultaneously evolving political agendas during the last two decades - sustainability and health promotion - that have framed communication efforts, campaigns and politics in general. How is public participation and deliberation...

  9. Ethical case deliberation and decision making.

    Science.gov (United States)

    Gracia, Diego

    2003-01-01

    During the last thirty years different methods have been proposed in order to manage and resolve ethical quandaries, specially in the clinical setting. Some of these methodologies are based on the principles of Decision-making theory. Others looked to other philosophical traditions, like Principlism, Hermeneutics, Narrativism, Casuistry, Pragmatism, etc. This paper defends the view that deliberation is the cornerstone of any adequate methodology. This is due to the fact that moral decisions must take into account not only principles and ideas, but also emotions, values and beliefs. Deliberation is the process in which everyone concerned by the decision is considered a valid moral agent, obliged to give reasons for their own points of view, and to listen to the reasons of others. The goal of this process is not the reaching of a consensus but the enrichment of one's own point of view with that of the others, increasing in this way the maturity of one's own decision, in order to make it more wise or prudent. In many cases the members of a group of deliberation will differ in the final solution of the case, but the confrontation of their reasons will modify the perception of the problem of everyone. This is the profit of the process. Our moral decisions cannot be completely rational, due to the fact that they are influenced by feelings, values, beliefs, etc., but they must be reasonable, that is, wise and prudent. Deliberation is the main procedure to reach this goal. It obliges us to take others into account, respecting their different beliefs and values and prompting them to give reasons for their own points of view. This method has been traditional in Western clinical medicine all over its history, and it should be also the main procedure for clinical ethics.

  10. Reorienting Deliberation: Identity Politics in Multicultural Societies

    Directory of Open Access Journals (Sweden)

    Rebecca Mason

    2010-03-01

    Full Text Available Many political theorists argue that cross-cultural communication within multicultural democracies is not best served by a commitment to identity politics. In response, I argue that identity politics only interfere with democratic participation according to an erroneous interpretation of the relationship between identity and reasoning. I argue that recognizing the importance of identity to the intelligibility of reasons offered in the context of civic deliberation is the first step towards the kind of dialogue that democratic participation requires.

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. The Sky at Night

    CERN Document Server

    Moore, Patrick

    2010-01-01

    For more than 50 years now Sir Patrick Moore has presented the BBC Television series Sky at Night; not a month has been missed – a record for any television series, and a record which may never be broken. Every three years or so a book is published covering the main events in both astronomy and space research. This is the 13th volume, not only a record of the programmes but also of the great advances and discoveries during the period covered - eclipses, comets, and the strange chemical lakes of Titan, for instance, but also anniversaries such as the fifteenth “birthday” of the Hubble Space Telescope, and not forgetting the programme celebrating the Sky at Night’s 50th year, attended by astronaut Piers Sellars and many others who appeared on the programme over the years. All the chapters are self-contained, and fully illustrated. In this new Sky at Night book you will find much to entertain you. It will appeal to amateurs and professionals alike.

  13. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  14. Paul Graham, American Night

    Directory of Open Access Journals (Sweden)

    Catherine Bernard

    2006-12-01

    Full Text Available Le photographe britannique Paul Graham (1956- ne jouit pas encore en France de la notoriété de son compatriote Martin Parr et on ne peut, par conséquent, que se féliciter de voir l’une de ses plus puissantes séries — American Night — représentée à la Galerie Les Filles du Calvaire.Connu, avec Parr, pour avoir profondément influencé la photo documentaire anglaise en la faisant passer à la couleur avec virulence, Graham a été révélé il y a une vingtaine d’années par une série d’images prises à...

  15. Nightly Test system migration

    CERN Document Server

    Win-Lime, Kevin

    2013-01-01

    The summer student program allows students to participate to the Cern adventure. They can follow several interesting lectures about particle science and participate to the experiment work. As a summer student, I had worked for LHCb experiment. LHCb uses a lot of software to analyze its data. All this software is organized in packages and projects. They are built and tested during the night using an automated system and the results are displayed on a web interface. Actually, LHCb is changing this system. It is looking for a replacement candidate. So I was charged to unify some internal interfaces to permit a swift migration. In this document, I will describe shortly the system used by LHCb, then I will explain what I have done in detail.

  16. Dead of night.

    Science.gov (United States)

    Balter, Leon

    2010-07-01

    Dead of Night, the first psychoanalytic horror film, was produced in England in 1945, immediately after the end of World War II--that is, after the English population had suffered systematic Nazi terror from imminent invasion, incessant aerial bombing, and rocket-bombs. This film continued the prewar format of horror films based on themes of the supernatural and the hubris and excesses of science. However, it introduced psychoanalysis as the science in question. The film is structured on two levels: a genteel English country weekend to which witty and urbane guests have been invited; and five horror stories told by the guests. Psychoanalytic insights into this film structure are used here to explain how the film induces horror in the audience.

  17. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  19. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  20. Battle of Manila: Offensive, Deliberate Attack, MOUT, January-February 1945

    Science.gov (United States)

    1984-05-01

    on the 8th Cavalry’s left flank, used native bancas . The speed with which the division established a bridgehead on the far side, took the Japanese by...op. cit., HO Sixth Army Preface. 7.!. Walter Krueger, From Down Under the Nippon, (Washington, D.C.: Combat Forces Press ,1953), p. 324. 31. Malor B...Forces Press , 1957. MacArthur, Douglas. Report of General MacArthur. Volume I. Washington, D.C.: U.S. Government Printing Office, 1966. . Volume II

  1. Battle Analysis: Rapido River Crossing, Offensive, Deliberate Attack, River Crossing, January 1944

    Science.gov (United States)

    1984-05-01

    Even the few employed were difficult to use due to the slippery surface and the lack of handrails. Direct and indirect fire chewed them up. The...were placed in the water and went down quickly, sometimes carrying men loaded with heavy combat equipment. 42 mmmimm^^mtm—mm^ elm ^tmmMMM

  2. Suicide Following Deliberate Self-Harm.

    Science.gov (United States)

    Olfson, Mark; Wall, Melanie; Wang, Shuai; Crystal, Stephen; Gerhard, Tobias; Blanco, Carlos

    2017-08-01

    The authors sought to identify risk factors for repeat self-harm and completed suicide over the following year among adults with deliberate self-harm. A national cohort of Medicaid-financed adults clinically diagnosed with deliberate self-harm (N=61,297) was followed for up to 1 year. Repeat self-harm per 1,000 person-years and suicide rates per 100,000 person-years (based on cause of death information from the National Death Index) were determined. Hazard ratios of repeat self-harm and suicide were estimated by Cox proportional hazard models. During the 12 months after nonfatal self-harm, the rate of repeat self-harm was 263.2 per 1,000 person-years and the rate of completed suicide was 439.1 per 100,000 person-years, or 37.2 times higher than in a matched general population cohort. The hazard of suicide was higher after initial self-harm events involving violent as compared with nonviolent methods (hazard ratio=7.5, 95% CI=5.5-10.1), especially firearms (hazard ratio=15.86, 95% CI=10.7-23.4; computed with poisoning as reference), and to a lesser extent after events of patients who had recently received outpatient mental health care (hazard ratio=1.6, 95% CI=1.2-2.0). Compared with self-harm patients using nonviolent methods, those who used violent methods were at significantly increased risk of suicide during the first 30 days after the initial event (hazard ratio=17.5, 95% CI=11.2-27.3), but not during the following 335 days. Adults treated for deliberate self-harm frequently repeat self-harm in the following year. Patients who use a violent method for their initial self-harm, especially firearms, have an exceptionally high risk of suicide, particularly right after the initial event, which highlights the importance of careful assessment and close follow-up of this group.

  3. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  4. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  5. Decision making uncertainty, imperfection, deliberation and scalability

    CERN Document Server

    Kárný, Miroslav; Wolpert, David

    2015-01-01

    This volume focuses on uncovering the fundamental forces underlying dynamic decision making among multiple interacting, imperfect and selfish decision makers. The chapters are written by leading experts from different disciplines, all considering the many sources of imperfection in decision making, and always with an eye to decreasing the myriad discrepancies between theory and real world human decision making. Topics addressed include uncertainty, deliberation cost and the complexity arising from the inherent large computational scale of decision making in these systems. In particular, analyses and experiments are presented which concern: • task allocation to maximize “the wisdom of the crowd”; • design of a society of “edutainment” robots who account for one anothers’ emotional states; • recognizing and counteracting seemingly non-rational human decision making; • coping with extreme scale when learning causality in networks; • efficiently incorporating expert knowledge in personalized...

  6. Mental Models and Deliberate Manipulation of Data

    DEFF Research Database (Denmark)

    Koester, Thomas; Jakobsen, Jeanette; Brøsted, Jesper Ejdorf

    2015-01-01

    Human factors risk analysis and usability tests in telemedicine contexts primarily seek to investigate how to reduce the likelihood of slips, lapses and mistakes. However, to ensure trustworthiness in e-health data, one must also be aware of more intentional patient actions which could potentially...... compromise patient safety and/or the integrity of the system. The pilot study in this paper set out to explore mental models and deliberate manipulation of data in a Danish telemedicine setting of home monitoring among pregnant women. Results show, that patients construct mental models of the telemedicine...... system, and that the patient can utilize such mental models in attempts to manipulate their data input to get a desired output from the telemedicine system....

  7. A Model for Deliberation, Action and Introspection.

    Science.gov (United States)

    1980-05-01

    construction in the face. William Shakespeare , Macbeth Good I.ord. what is man! for as simple he looks, )o hut try to dhelop his hooks and his crooks...lIleSS IlIec 130]1011! bless thce! thou art translated. William Shakespeare , I AlIijsu,,mr Night s nream It senms likely that SDI. can hc uscd to realiz.c...diabetes. And one finally learns how to concentrate well on one’s work to succeed, only to appear distant and uncaring to one’s family and companions

  8. The effects of deliberate practice in undergraduate medical education

    NARCIS (Netherlands)

    Moulaert, Véronique; Verwijnen, Maarten GM; Rikers, Remy; Scherpbier, Albert JJA

    2004-01-01

    INTRODUCTION: Ericsson and colleagues introduced the term 'deliberate practice' to describe training activities that are especially designed to maximise improvement. They stressed that how much one practises is as important as how one practises. Essential aspects of deliberate practice are the

  9. Good Will: Cosmopolitan Education as a Site for Deliberation

    Science.gov (United States)

    Roth, Klas

    2011-01-01

    Why should we deliberate? I discuss a Kantian response to this query and argue that we cannot as rational beings avoid deliberation in principle; and that we have good reasons to consider the value and strength of Kant's philosophical investigations concerning fundamental moral issues and their relevance for the question of why we ought to…

  10. Curricular Deliberation about "Hamlet": An Exercise in the Practical.

    Science.gov (United States)

    Siegel, Judith Susan

    This study attempts to clarify and exploit Joseph Schwab's recent and current work on "practical" and "eclectic" curriculums in a simulated deliberation about a concrete curricular question, How might "Hamlet" be taught to one group of high school juniors? By exemplifying curricular deliberation, it aims to clarify…

  11. Traffic Light Detection at Night

    DEFF Research Database (Denmark)

    Jensen, Morten Bornø; Philipsen, Mark Philip; Bahnsen, Chris

    2015-01-01

    Traffic light recognition (TLR) is an integral part of any in- telligent vehicle, it must function both at day and at night. However, the majority of TLR research is focused on day-time scenarios. In this paper we will focus on detection of traffic lights at night and evalu- ate the performance...... of three detectors based on heuristic models and one learning-based detector. Evaluation is done on night-time data from the public LISA Traffic Light Dataset. The learning-based detector out- performs the model-based detectors in both precision and recall. The learning-based detector achieves an average...

  12. AHP 47: A NIGHT DATE

    Directory of Open Access Journals (Sweden)

    Phun tshogs dbang rgyal ཕུན་ཚོགས་དབང་རྒྱལ།

    2017-04-01

    Full Text Available The author was born in 1993 in Ska chung (Gaqun Village, Nyin mtha' (Ningmute Township, Rma lho (Henan Mongolian Autonomous County, Rma lho (Huangnan Tibetan Autonomous Prefecture, Mtsho sngon (Qinghai Province, PR China. Night dating was popular for teenage boys some years ago. They rode horses and yaks when they went night dating. They generally rode yaks, because horses were important for their families and used for such important tasks as pursuing bandits and going to the county town for grain and supplies. An early experience with night dating is described.

  13. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  16. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  17. Discover POPSCIENCE on Researchers' Night

    CERN Multimedia

    The POPSCIENCE Team

    2014-01-01

    On Friday 26 September 2014, CERN will be celebrating European Researchers' Night at three venues in Geneva and St. Genis-Pouilly. Inspired by Andy Warhol, this year's theme is “Pop science is for everyone”.     Every year, on the last Friday of September, the European Researchers’ Night takes place in about 300 cities all over Europe, with funding from the EU, to promote research and highlight researchers in engaging and fun ways for the general public. Andy Warhol said, “Pop art is for everyone”. This year, “Pop science is for everyone” is the motto of the Researchers’ Night event organised by CERN and its partners*. The night will offer everyone the opportunity to learn about the latest discoveries in physics and cosmology through poetry, theatre and music. This will be in addition to the event's traditional activities for the general public. To attract new audiences,...

  18. The Effect Specialization and Diversification Involvement on Learning of Sports Skills According To Deliberate Practice and Deliberate Play

    Directory of Open Access Journals (Sweden)

    Mahdi Fahimi

    2016-12-01

    Full Text Available Objective: The aim was effect deliberate practice and deliberate play on sports skills with emphasis on specialization and diversification in boys 10-12. Methods: The 120 male students randomly divided into four groups of volleyball, soccer, basketball deliberate practice and deliberate play. Pretest and posttest were AAHPERD volleyball, soccer, and Basketball sports skills. Duration of the project was 16 weeks and 3 sessions per week and 90 minutes each session began. Data obtained from questionnaires and personal details about sports experience and test were adjusted using parametric tests, such as T-dependent test and MANOVA with Tukey post hoc test, and software Statistical SPSS19. Results: The results of the study showed that compared four groups, deliberate plays to other deliberate practices have a better motor skill in volleyball, soccer and Basketball sports skills (P<0.05. Volleyball and soccer deliberate practice group had developed Soccer Dribble Test and Control dribble and Defensive movement basketball skills test. Basketball deliberate practice group had not developed the others soccer and volleyball skills. Conclusion: The results showed that diversification participation in some exercises during the early stages of growth, can facilitate the development of general cognitive and physiological skills and create a rich environment for children.

  19. Collaborative deliberation: a model for patient care.

    Science.gov (United States)

    Elwyn, Glyn; Lloyd, Amy; May, Carl; van der Weijden, Trudy; Stiggelbout, Anne; Edwards, Adrian; Frosch, Dominick L; Rapley, Tim; Barr, Paul; Walsh, Thom; Grande, Stuart W; Montori, Victor; Epstein, Ronald

    2014-11-01

    Existing theoretical work in decision making and behavior change has focused on how individuals arrive at decisions or form intentions. Less attention has been given to theorizing the requirements that might be necessary for individuals to work collaboratively to address difficult decisions, consider new alternatives, or change behaviors. The goal of this work was to develop, as a forerunner to a middle range theory, a conceptual model that considers the process of supporting patients to consider alternative health care options, in collaboration with clinicians, and others. Theory building among researchers with experience and expertise in clinician-patient communication, using an iterative cycle of discussions. We developed a model composed of five inter-related propositions that serve as a foundation for clinical communication processes that honor the ethical principles of respecting individual agency, autonomy, and an empathic approach to practice. We named the model 'collaborative deliberation.' The propositions describe: (1) constructive interpersonal engagement, (2) recognition of alternative actions, (3) comparative learning, (4) preference construction and elicitation, and (5) preference integration. We believe the model underpins multiple suggested approaches to clinical practice that take the form of patient centered care, motivational interviewing, goal setting, action planning, and shared decision making. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  1. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  2. Deliberating on intersectionality: women’s conferences in Recife

    Directory of Open Access Journals (Sweden)

    Maria-Hélène Sa Vilas Boas

    2015-12-01

    Full Text Available Under what conditions can deliberation include marginalized social groups? Several feminist authors criticize deliberative theory for reproducing power relations between social groups. They defend the explicit recognition of marginalized social groups within deliberative devices. This article aims to analyze the dynamics of deliberation when it gathers a traditionally underrepresented group, women. Based on the study of women’s conferences in Recife, it shows that the combination the politics of recognition and deliberation can lead both to the integration and marginalization of different actors within the group of women, depending on the resources they have available to voice their perspectives.

  3. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  4. Night airglow in RGB mode

    Directory of Open Access Journals (Sweden)

    Mikhalev А.V.

    2016-09-01

    Full Text Available To study dynamics of the upper atmosphere, we consider results of the night sky photometry, using a color CCD camera and taking into account the night airglow and features of its spectral composition. We use night airglow observations for 2010–2015, which have been obtained at the ISTP SB RAS Geophysical Observatory (52° N, 103° E by the camera with KODAK KAI-11002 CCD sensor. We estimate average brightness of the night sky in R, G, B channels of the color camera for eastern Siberia with typical values ranging from ~0.008 to 0.01 erg·cm–2·s–1. Besides, we determine seasonal variations in the night sky luminosities in R, G, B channels of the color camera. In these channels, luminosities decrease in spring, increase in autumn, and have a pronounced summer maximum, which can be explained by scattered light and is associated with the location of the Geophysical Observatory. We consider geophysical phenomena with their optical effects in R, G, B channels of the color camera. For some geophysical phenomena (geomagnetic storms, sudden stratospheric warmings, we demonstrate the possibility of quantitative relationship between enhanced signals in R and G channels and increases in intensities of discrete 557.7 and 630 nm emissions, which are predominant in the airglow spectrum

  5. How Should We Deliberate? Between the Argumentative and the Representative Dimensions of Democratic Deliberation

    Directory of Open Access Journals (Sweden)

    Tutui Viorel

    2012-01-01

    Full Text Available Abstract: My paper focuses on an important subject of the contemporary theory of democracy: what is the relationship between the argumentative and the representative dimensions of deliberative democracy? Using James Fishkin’s account of deliberative democracy and its relations with other democratic models I will argue that there is a severe conflict between these two dimensions: the attempt to enhance the value of argumentation presupposes a decrease in the representative value and the attempt to enhance the representative value results in a decrease in the argumentative value. This conflict is generated by what I call ‘the paradox of democratic deliberation’: the legitimacy of political decisions demands for the ‘raw’ opinion of the citizens, while the epistemic rightness of political decisions demands for a ‘filtered’ public opinion. But we cannot have both. In the final part of this paper I will sustain a moderate conception regarding the role of deliberation in democracy which offers us a way around this paradox but only at the price of significantly reducing the importance of deliberation.

  6. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  7. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  8. Diet quality and sleep quality among day and night shift nurses.

    Science.gov (United States)

    Beebe, Deborah; Chang, Jen Jen; Kress, Kathleen; Mattfeldt-Beman, Mildred

    2017-10-01

    To determine whether night shift workers have a poorer diet quality and sleep quality when compared with day shift nurses. There is a dearth of research investigating the association between diet quality and sleep quality of day and night shift nurses. Data on nurses (n = 103) working either a day or night shift from two Midwestern hospitals were obtained from August 2015 to February 2016. The instruments used were the Diet History Questionnaire and the Pittsburg Sleep Quality Index. Independent samples t-tests were used to examine differences in diet and sleep quality by work shift schedule. There were no statistically significant differences between nurses working day or night shift and sleep quality (P = 0.0684), as well as diet quality (P = 0.6499). There was a significant difference between both body mass index (P = 0.0014) and exercise (P = 0.0020) with regard to diet quality. Body mass index and sleep quality were also significantly associated (P = 0.0032). Our study found no differences between day and night shift with regard to sleep and diet quality among nurses. Deliberate health initiatives and wellness programmes specifically targeting nurses are needed to increase knowledge about maintaining a healthy lifestyle while working as a nurse, whether it is day or night shift. © 2017 John Wiley & Sons Ltd.

  9. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  10. Engaging Youth and Pre-Service Teachers in Immigration Deliberations

    Science.gov (United States)

    Daniel, Shannon M.

    2015-01-01

    In this report of innovative teacher practice, the author describes an arts-based event which brought together adolescent refugee and immigrant students and pre-service teachers to deliberate about immigration policies and attitudes in the United States.

  11. The epistemic-teleologic model of deliberate self-persuasion.

    Science.gov (United States)

    Maio, Gregory R; Thomas, Geoff

    2007-02-01

    Although past theory and research point to the importance of understanding deliberate self-persuasion (i.e., deliberate self-induced attitude change), there have been no empirical and theoretical efforts to model this process. This article proposes a new model to help understand the process, while comparing the process of deliberate self-persuasion with relevant theory and research. The core feature of this model is a distinction between epistemic processes, which involve attempting to form new valid attitudes, and teleologic processes, which involve self-induced attitude change but with minimal concerns for validity. The epistemic processes employ tactics of reinterpretation, reattribution, reintegration, retesting, changing comparators, and changing dimensions of comparison. The teleologic processes include suppression, preemption, distraction, and concentration. By mapping these processes, this model helps to generate many novel and testable hypotheses about the use of deliberate self-persuasion to cope with ambivalent attitudes.

  12. Network Design for Reliability and Resilience to Attack

    Science.gov (United States)

    2014-03-01

    Program MNE Montenegro PPS-m-n Path-Portfolio-Selection problem where the defender can select a set of m paths and the attacker can destroy n arcs in...where power plants are represented by nodes. Such a node could fail, causing a chain reaction and blackout. An example for a network with arc...deliberate and un- intentional failures. An unintentional failure is a random failure that just happens, e.g., a power plant goes down because of age. A

  13. A night with good vibrations

    CERN Multimedia

    2002-01-01

    For its third edition, the Museum d'histoire des sciences invites you to a Science Night under the banner of waves and undulations. Scientists, artists and storytellers from more than forty institutes and local or regional associations will show in only one weekend that waves and undulations form an integral part of our daily environment. Telephones, televisions, radios, irons, lighting, music, sun rays, stars, rainbows, earthquakes and other natural phenomena - all produce, emit or receive waves or undulations. The visitors attending the Night will be able to get in contact with the nature of waves through interactive exhibitions on sound and light and through hands-on demonstrations arranged around the Bartholoni villa and in the Park of the Perle du lac. An amusing and distracting way to familiarize yourself with the concepts of wavelength, frequency and interference lengths... In addition to the stands, the Night will offer many other activities: reconstructions of critical experiments, scientific consu...

  14. A night with good vibrations

    CERN Multimedia

    2002-01-01

    Next week-end, the Geneva Science History Museum invites you to a Science Night under the banner of waves and vibrations. Scientists, artists and storytellers from more than forty institutes and local or regional associations will show that waves and vibrations form an integral part of our environment. You will be able to get in contact with the nature of waves through interactive exhibitions on sound and light and through hands-on demonstrations arranged in the Park of the Perle du Lac. On the CERN stand, you will be able to measure the speed of light with a bar of chocolate, and understand the scattering of waves with plastic ducks. Amazing, no? In addition to the stands, the Night will offer many other activities: reconstructions of experiments, a play, a concert of crystal glasses, an illuminated fountain, a house of spirits. More information Science Night, 6 and 7 July, Park of the Perle du Lac, Geneva

  15. Procedures and Methods for Cross-community Online Deliberation

    Directory of Open Access Journals (Sweden)

    Cyril Velikanov

    2010-09-01

    Full Text Available In this paper we introduce our model of self-regulated mass online deliberation, and apply it to a context of cross-border deliberation involving translation of contributions between participating languages, and then to a context of cross-community online deliberation for dispute resolution, e.g. between opposing ethnic or religious communities. In such a cross-border or cross-community context, online deliberation should preferably progress as a sequence of segmented phases each followed by a combining phase. In a segmented phase, each community deliberates separately, and selects their best contributions for being presented to all other communities. Selection is made by using our proposed mechanism of mutual moderation and appraisal of contributions by participants themselves. In the subsequent combining phase, the selected contributions are translated (by volunteering or randomly selected participants among those who have specified appropriate language skills and presented to target segments for further appraisal and commenting. Our arguments in support of the proposed mutual moderation and appraisal procedures remain mostly speculative, as the whole subject of mass online self-regulatory deliberation still remains largely unexplored, and there exist no practical realisation of it .

  16. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  17. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  18. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  1. Progress in color night vision

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.

    2012-01-01

    We present an overview of our recent progress and the current state-of-the-art techniques of color image fusion for night vision applications. Inspired by previously developed color opponent fusing schemes, we initially developed a simple pixel-based false color-mapping scheme that yielded fused

  2. Volunteers for Researchers’ Night wanted

    CERN Multimedia

    Katarina Anthony

    2015-01-01

    Every year, on the last Friday of September, the European Researchers’ Night (see here) takes place in about 300 cities all over Europe - promoting research in engaging and fun ways for the general public. This year, CERN will be participating once again, hosting dozens of events across the Balexert shopping centre – and we’ll need YOUR help to make the celebration a success.   From film screenings and celebrity Q&A sessions to “Ask a Researcher” and build-your-own LEGO LHC events, this year’s Researchers’ Night is going to be jam-packed! The fun will kick off prior to the night itself with a mock-up of the LHC tunnel installed in the central court of the Balexert shopping centre, 8-12 September*. CERN people will be on hand to speak to shoppers about the LHC, and to encourage them to participate in Researchers’ Night! The CERN organisers are recruiting volunteers and support staff for Researchers’ ...

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  5. Sleeping position and reported night-time asthma symptoms and medication.

    Science.gov (United States)

    Kalolella, Admirabilis Beno

    2016-01-01

    A 49 years old man, known case of bronchial asthma for 43 years, with history of frequent asthmatic attacks, usually responding to double dose of intravenous Aminophylline and double dose of Hydrocortisone was received at medical emergency care unit at midnight with night-time asthma attack. The attack did not settle with Aminophylline single Intravenous injection. He was then admitted and put in supine sleep position for re-evaluation while his asthma symptoms were monitored while waiting for the medical officer's evaluation of his asthma status. After 3 hours of observation, asthma symptoms were relieved, and patient was discharged home and advised to sleep in supine position throughout every night to prevent asthma symptoms. The patient was followed up through nighttime sleep diary for one month. After one month period of monitoring, the patient had significance reduction in asthma symptoms and reduced night time medication, reduced episodes of night awakening due to asthma symptoms, and improved capability for normal works. This case report describes a novel approach of management and prophylaxis of asthmatic episodes through sleeping position that reduces and control asthma symptoms resulting in reduced drug consumption.

  6. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  7. Hot Flashes amd Night Sweats (PDQ)

    Science.gov (United States)

    ... Professionals Questions to Ask about Your Treatment Research Hot Flashes and Night Sweats (PDQ®)–Patient Version Overview ... quality of life in many patients with cancer. Hot flashes and night sweats may be side effects ...

  8. Using deliberation to address controversial issues: Developing Holocaust education curriculum.

    Directory of Open Access Journals (Sweden)

    THOMAS MISCO

    2007-10-01

    Full Text Available This paper explores how a cross-cultural project responded to the need for new Holocaust educational materials for the Republic of Latvia through the method of curriculum deliberation. Analysis of interview, observational, and document data drawn from seven curriculum writers and numerous project members suggest that curriculum deliberation helped awaken a controversial and silenced history while attending to a wide range of needs and concerns for a variety of stakeholders. The findings highlight structural features that empowered the curriculum writers as they engaged in protracted rumination, reflected upon competing norms, and considered the nuances of the curriculum problem in relation to implementation. Understanding the process, challenges, and promises of cross-cultural curriculum deliberation holds significance for educators, curricularists, and educational researchers wishing to advance teaching and learning within silenced histories and controversial issues.

  9. Sources of bias in clinical ethics case deliberation.

    Science.gov (United States)

    Magelssen, Morten; Pedersen, Reidar; Førde, Reidun

    2014-10-01

    A central task for clinical ethics consultants and committees (CEC) is providing analysis of, and advice on, prospective or retrospective clinical cases. However, several kinds of biases may threaten the integrity, relevance or quality of the CEC's deliberation. Bias should be identified and, if possible, reduced or counteracted. This paper provides a systematic classification of kinds of bias that may be present in a CEC's case deliberation. Six kinds of bias are discussed, with examples, as to their significance and risk factors. Possible remedies are suggested. The potential for bias is greater when the case deliberation is performed by an individual ethics consultant than when an entire clinical ethics committee is involved. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  14. Intuitive and Deliberate Judgments Are Based on Common Principles

    Science.gov (United States)

    Kruglanski, Arie W.; Gigerenzer, Gerd

    2011-01-01

    A popular distinction in cognitive and social psychology has been between "intuitive" and "deliberate" judgments. This juxtaposition has aligned in dual-process theories of reasoning associative, unconscious, effortless, heuristic, and suboptimal processes (assumed to foster intuitive judgments) versus rule-based, conscious, effortful, analytic,…

  15. Deliberating about race as a variable in biomedical research | van ...

    African Journals Online (AJOL)

    Race as a variable in research ethics is investigated: to what extent is it morally appropriate to regard the race of research subjects as pivotal for research outcomes? The challenges it poses to deliberation in research ethics committees are considered, and it is concluded that race sometimes must be considered, subject to ...

  16. Dewey's Ethical Justification for Public Deliberation Democracy

    Science.gov (United States)

    Shook, John

    2013-01-01

    Interpretations of John Dewey's political theory grasp his respect for public deliberation, but typically overlook his ethical justification for democracy. Dewey gave two primary reasons why democracy is superior to other forms of government. First, a public educated in the tools of social intelligence can be more effective at managing their…

  17. Dewey's Theory of Moral (and Political) Deliberation Unfiltered

    Science.gov (United States)

    Ralston, Shane J.

    2010-01-01

    In this paper, I argue that many recent interpretations of John Dewey's vision of democracy distort that vision by filtering it through the prism of contemporary deliberative democratic theories. An earlier attempt to defend Dewey's theory of moral deliberation is instructive for understanding the nature and function of this filter. In James…

  18. Cognitive-behavioural therapy for deliberate self-harm

    NARCIS (Netherlands)

    Slee, Nadja

    2008-01-01

    This thesis describes the outcomes of a randomized controlled trial of a Cognitive Behavioural Therapy (CBT) intervention for patients who engage in Deliberate Self-Harm (DSH). The CBT intervention was designed to supplement usual care following an episode of DSH. The study involved 90 people (95%

  19. Deliberate Learning and Vocabulary Acquisition in a Second Language

    Science.gov (United States)

    Elgort, Irina

    2011-01-01

    This study investigates outcomes of deliberate learning on vocabulary acquisition in a second language (L2). Acquisition of 48 pseudowords was measured using the lexical decision task with visually presented stimuli. The experiments drew on form priming, masked repetition priming, and automatic semantic priming procedures. Data analyses revealed a…

  20. Client participation in moral case deliberation: a precarious relational balance

    NARCIS (Netherlands)

    Weidema, F.C.; Abma, T.A.; Widdershoven, G.A.M.; Molewijk, A.C.

    2011-01-01

    Moral case deliberation (MCD) is a form of clinical ethics support in which the ethicist as facilitator aims at supporting professionals with a structured moral inquiry into their moral issues from practice. Cases often affect clients, however, their inclusion in MCD is not common. Client

  1. Organizing moral case deliberation experiences in two Dutch nursing homes

    NARCIS (Netherlands)

    van der Dam, S.; Abma, T.A.; Molewijk, A.C.; Kardol, M.J.M.; Schols, J.M.G.A.

    2011-01-01

    Moral case deliberation (MCD) is a specific form of clinical ethics, aiming to stimulate ethical reflection in daily practice in order to improve the quality of care. This article focuses on the implementation of MCD in nursing homes and the questions how and where to organize MCD. The purpose of

  2. popscience - European Researchers Night 2014

    CERN Multimedia

    Jeanneret, Guillaume

    2014-01-01

    Vendredi 26 septembre 2014, le CERN célèbrera la Nuit européenne des chercheurs à Genève et à St-Genis-Pouilly. Le thème de l’édition 2014 est inspiré d’Andy Warhol : « Pop science is for everyone ». On Friday 26 September 2014, CERN will be celebrating European Researchers' Night at three venues in Geneva and St. Genis-Pouilly. Inspired by Andy Warhol, this year's theme is “Pop science is for everyone”.

  3. Sleep, ageing and night work

    Directory of Open Access Journals (Sweden)

    M.L.N. Pires

    2009-09-01

    Full Text Available Studies have shown that the frequency or worsening of sleep disorders tends to increase with age and that the ability to perform circadian adjustments tends to decrease in individuals who work the night shift. This condition can cause consequences such as excessive sleepiness, which are often a factor in accidents that occur at work. The present study investigated the effects of age on the daytime and nighttime sleep patterns using polysomnography (PSG of long-haul bus drivers working fixed night or day shifts. A total of 124 drivers, free of sleep disorders and grouped according to age (<45 years, N = 85, and ≥45 years, N = 39 and PSG timing (daytime (D PSG, N = 60; nighttime (N PSG, N = 64 participated in the study. We observed a significant effect of bedtime (D vs N and found that the length of daytime sleep was shorter [D: <45 years (336.10 ± 73.75 min vs N: <45 years (398 ± 78.79 min and D: ≥45 years (346.57 ± 43.17 min vs N: ≥45 years (386.44 ± 52.92 min; P ≤ 0.05]. Daytime sleep was less efficient compared to nighttime sleep [D: <45 years (78.86 ± 13.30% vs N: <45 years (86.45 ± 9.77% and D: ≥45 years (79.89 ± 9.45% and N: ≥45 years (83.13 ± 9.13%; P ≤ 0.05]. An effect of age was observed for rapid eye movement sleep [D: <45 years (18.05 ± 6.12% vs D: ≥45 years (15.48 ± 7.11% and N: <45 years (23.88 ± 6.75% vs N: ≥45 years (20.77 ± 5.64%; P ≤ 0.05], which was greater in younger drivers. These findings are inconsistent with the notion that older night workers are more adversely affected than younger night workers by the challenge of attempting to rest during the day.

  4. Sociopolitical drivers in the development of deliberate carbon storage

    Science.gov (United States)

    Stephens, Jennie C.

    The idea of engineering the storage of carbon released from fossil fuel burning in reservoirs other than the atmosphere has developed in the past 20 years from an obscure idea to an increasingly recognized potential approach that could be an important contributor to stabilizing atmospheric carbon dioxide (CO2) concentrations. Despite the intense application of scientific and technological expertise to the development of options for deliberate carbon storage, nontechnical factors play an important role. This chapter identifies sociopolitical, nontechnical factors that have contributed to the development of ideas and technologies associated with deliberate carbon storage. Broadly, interest in deliberate storage has expanded in response to increasing societal attention to reducing CO2 emissions for climate change mitigation. Specific societal groups, or stakeholders, which have contributed to the recent focus on carbon storage include the fossil fuel industry that has been shifting to a strategy of confronting rather than denying the CO2-climate change connection, a scientific community motivated by an increased sense of urgency of the need to reduce atmospheric CO2 concentrations, the general public with little knowledge about or awareness of carbon storage, and environmental advocacy groups that have demonstrated some divergence in levels of support for deliberate carbon storage. Among the policy mechanisms that have provided incentives for deliberate carbon storage are national accounting of carbon sources and sinks and carbon taxes. Another driver with particular importance in the United States is the political preference of some politicians to support development of advanced technologies for climate change mitigation rather than supporting mandatory CO2 regulations.

  5. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Night shift work and modifiable lifestyle factors.

    Science.gov (United States)

    Pepłońska, Beata; Burdelak, Weronika; Krysicka, Jolanta; Bukowska, Agnieszka; Marcinkiewicz, Andrzej; Sobala, Wojciech; Klimecka-Muszyńska, Dorota; Rybacki, Marcin

    2014-10-01

    Night shift work has been linked to some chronic diseases. Modification of lifestyle by night work may partially contribute to the development of these diseases, nevertheless, so far epidemiological evidence is limited. The aim of the study was to explore association between night shift work and lifestyle factors using data from a cross-sectional study among blue-collar workers employed in industrial plants in Łódź, Poland. The anonymous questionnaire was self-administered among 605 employees (236 women and 369 men, aged 35 or more) - 434 individuals currently working night shifts. Distribution of the selected lifestyle related factors such as smoking, alcohol drinking, physical activity, body mass index (BMI), number of main meals and the hour of the last meal was compared between current, former, and never night shift workers. Adjusted ORs or predicted means were calculated, as a measure of the associations between night shift work and lifestyle factors, with age, marital status and education included in the models as covariates. Recreational inactivity (defined here as less than one hour per week of recreational physical activity) was associated with current night shift work when compared to never night shift workers (OR = 2.43, 95% CI: 1.13-5.22) among men. Alcohol abstinence and later time of the last meal was associated with night shift work among women. Statistically significant positive relationship between night shift work duration and BMI was observed among men (p = 0.029). This study confirms previous studies reporting lower exercising among night shift workers and tendency to increase body weight. This finding provides important public health implication for the prevention of chronic diseases among night shift workers. Initiatives promoting physical activity addressed in particular to the night shift workers are recommended.

  8. Night shift work and modifiable lifestyle factors

    Directory of Open Access Journals (Sweden)

    Beata Pepłońska

    2014-10-01

    Full Text Available Objectives: Night shift work has been linked to some chronic diseases. Modification of lifestyle by night work may partially contribute to the development of these diseases, nevertheless, so far epidemiological evidence is limited. The aim of the study was to explore association between night shift work and lifestyle factors using data from a cross-sectional study among blue-collar workers employed in industrial plants in Łódź, Poland. Material and Methods: The anonymous questionnaire was self-administered among 605 employees (236 women and 369 men, aged 35 or more - 434 individuals currently wor­king night shifts. Distribution of the selected lifestyle related factors such as smoking, alcohol drinking, physical activity, body mass index (BMI, number of main meals and the hour of the last meal was compared between current, former, and never night shift workers. Adjusted ORs or predicted means were calculated, as a measure of the associations between night shift work and lifestyle factors, with age, marital status and education included in the models as covariates. Results: Recreational inactivity (defined here as less than one hour per week of recreational physical activity was associated with current night shift work when compared to never night shift workers (OR = 2.43, 95% CI: 1.13-5.22 among men. Alcohol abstinence and later time of the last meal was associated with night shift work among women. Statistically significant positive relationship between night shift work duration and BMI was observed among men (p = 0.029. Conclusions: This study confirms previous studies reporting lower exercising among night shift workers and tendency to increase body weight. This finding provides important public health implication for the prevention of chronic diseases among night shift workers. Initiatives promoting physical activity addressed in particular to the night shift workers are recommended.

  9. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  10. Channel by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 17 June 2004 This pair of images shows part of a small channel. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude 19.8, Longitude 141.5 East (218.5 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  11. Melas Chasma, Day and Night.

    Science.gov (United States)

    2002-01-01

    This image is a mosaic of day and night infrared images of Melas Chasma taken by the camera system on NASA's Mars Odyssey spacecraft. The daytime temperature images are shown in black and white, superimposed on the martian topography. A single nighttime temperature image is superimposed in color. The daytime temperatures range from approximately -35 degrees Celsius (-31 degrees Fahrenheit) in black to -5 degrees Celsius (23 degrees Fahrenheit) in white. Overlapping landslides and individual layers in the walls of Melas Chasma can be seen in this image. The landslides flowed over 100 kilometers (62 miles) across the floor of Melas Chasma, producing deposits with ridges and grooves of alternating warm and cold materials that can still be seen. The temperature differences in the daytime images are due primarily to lighting effects, where sunlit slopes are warm (bright) and shadowed slopes are cool (dark). The nighttime temperature differences are due to differences in the abundance of rocky materials that retain their heat at night and stay relatively warm (red). Fine grained dust and sand (blue) cools off more rapidly at night. These images were acquired using the thermal infrared imaging system infrared Band 9, centered at 12.6 micrometers.Jet Propulsion Laboratory, a division of the California Institute of Technology in Pasadena, manages the 2001 Mars Odyssey mission for NASA's Office of Space Science in Washington, D.C. Investigators at Arizona State University in Tempe, the University of Arizona in Tucson and NASA's Johnson Space Center, Houston, operate the science instruments. Additional science partners are located at the Russian Aviation and Space Agency and at Los Alamos National Laboratories, New Mexico. Lockheed Martin Astronautics, Denver, is the prime contractor for the project, and developed and built the orbiter. Mission operations are conducted jointly from Lockheed Martin and from JPL. Aviation and Space Agency and at Los Alamos National Laboratories

  12. Lomonosov Crater, Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 16 June 2004 This pair of images shows part of Lomonosov Crater. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude 64.9, Longitude 350.7 East (9.3 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  13. Night vision: changing the way we drive

    Science.gov (United States)

    Klapper, Stuart H.; Kyle, Robert J. S.; Nicklin, Robert L.; Kormos, Alexander L.

    2001-03-01

    A revolutionary new Night Vision System has been designed to help drivers see well beyond their headlights. From luxury automobiles to heavy trucks, Night Vision is helping drivers see better, see further, and react sooner. This paper describes how Night Vision Systems are being used in transportation and their viability for the future. It describes recent improvements to the system currently in the second year of production. It also addresses consumer education and awareness, cost reduction, product reliability, market expansion and future improvements.

  14. Oxidative DNA damage during night shift work.

    Science.gov (United States)

    Bhatti, Parveen; Mirick, Dana K; Randolph, Timothy W; Gong, Jicheng; Buchanan, Diana Taibi; Zhang, Junfeng Jim; Davis, Scott

    2017-09-01

    We previously reported that compared with night sleep, day sleep among shift workers was associated with reduced urinary excretion of 8-hydroxydeoxyguanosine (8-OH-dG), potentially reflecting a reduced ability to repair 8-OH-dG lesions in DNA. We identified the absence of melatonin during day sleep as the likely causative factor. We now investigate whether night work is also associated with reduced urinary excretion of 8-OH-dG. For this cross-sectional study, 50 shift workers with the largest negative differences in night work versus night sleep circulating melatonin levels (measured as 6-sulfatoxymelatonin in urine) were selected from among the 223 shift workers included in our previous study. 8-OH-dG concentrations were measured in stored urine samples using high performance liquid chromatography with electrochemical detection. Mixed effects models were used to compare night work versus night sleep 8-OH-dG levels. Circulating melatonin levels during night work (mean=17.1 ng/mg creatinine/mg creatinine) were much lower than during night sleep (mean=51.7 ng/mg creatinine). In adjusted analyses, average urinary 8-OH-dG levels during the night work period were only 20% of those observed during the night sleep period (95% CI 10% to 30%; psleep, is associated with reduced repair of 8-OH-dG lesions in DNA and that the effect is likely driven by melatonin suppression occurring during night work relative to night sleep. If confirmed, future studies should evaluate melatonin supplementation as a means to restore oxidative DNA damage repair capacity among shift workers. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  17. Evaluation and perceived results of moral case deliberation: A mixed methods study.

    Science.gov (United States)

    Janssens, Rien M J P A; van Zadelhoff, Ezra; van Loo, Ger; Widdershoven, Guy A M; Molewijk, Bert A C

    2015-12-01

    Moral case deliberation is increasingly becoming part of various Dutch healthcare organizations. Although some evaluation studies of moral case deliberation have been carried out, research into the results of moral case deliberation within aged care is scarce. How did participants evaluate moral case deliberation? What has moral case deliberation brought to them? What has moral case deliberation contributed to care practice? Should moral case deliberation be further implemented and, if so, how? Quantitative analysis of a questionnaire study among participants of moral case deliberation, both caregivers and team leaders. Qualitative analysis of written answers to open questions, interview study and focus group meetings among caregivers and team leaders. Caregivers and team leaders in a large organization for aged care in the Netherlands. A total of 61 moral case deliberation sessions, carried out on 16 care locations belonging to the organization, were evaluated and perceived results were assessed. Participants gave informed consent and anonymity was guaranteed. In the Netherlands, the law does not prescribe independent ethical review by an Institutional Review Board for this kind of research among healthcare professionals. Moral case deliberation was evaluated positively by the participants. Content and atmosphere of moral case deliberation received high scores, while organizational issues regarding the moral case deliberation sessions scored lower and merit further attention. Respondents indicated that moral case deliberation has the potential to contribute to care practice as relationships among team members improve, more openness is experienced and more understanding for different perspectives is fostered. If moral case deliberation is to be successfully implemented, top-down approaches should go hand in hand with bottom-up approaches. The relevance of moral case deliberation for care practice received wide acknowledgement from the respondents. It can contribute

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. A Deliberate Practice Instructional Approach for Upper Division Physics Courses

    Science.gov (United States)

    Jones, David

    2015-05-01

    In upper division physics courses, an overarching educational goal is to have students think about and use the material much as a practicing physicist in the field does. Specifically, this would include knowledge (such as concepts, formalism, and instruments), approaches, and metacognitive skills that physicists use in solving ``typical'' (research context) problems to both understand and predict physical observations and accompanying models. Using an interactive instructional approach known as deliberate practice (described earlier in this session) we will discuss our work on how to provide students with the necessary practice and feedback to achieve these skills in a core DAMOP course of modern optics. We present the results of a direct and explicit comparison between this approach and traditional lecture-based instruction revealing evidence that a significant improvement of the students' mastery of these skills occurs when deliberate practice is employed. Our work was supported by the University of British Columbia through the CWSEI.

  20. Sustainability and deliberate transition of socio-technical systems

    DEFF Research Database (Denmark)

    Hansen, Ole Erik; Søndergård, Bent; Stærdahl, Jens

    or developing socio-technical systems in order to integrate the concept of sustainability as a driver for the deliberate and purposeful shaping and transition. The article discusses the requirements to effective governance networks and governing of governance networks. Research within innovation systems......The article suggests that deliberate planning for sustainability demands a focus on the transition of socio-technical systems in order to establish robust and more sustainable patterns of production and consumption. This implies the necessity of a new perspective for environmental planning......, transition management and technology systems combined with planning and experimental activities provides both a theoretical and empirical body of knowledge of such governance processes. The article discusses how this perspective can be used in relation to the process of developing bio-fuel systems...

  1. Pragmatism, metaphysics, and bioethics: beyond a theory of moral deliberation.

    Science.gov (United States)

    Pamental, Matthew

    2013-12-01

    Pragmatism has been understood by bioethicists as yet another rival in the "methods wars," as yet another theory of moral deliberation. This has led to criticism of pragmatic bioethics as both theoretically and practically inadequate. Pragmatists' responses to these objections have focused mainly on misunderstandings of pragmatism's epistemology. These responses are insufficient. Pragmatism's commitment to radical empiricism gives it theoretical resources unappreciated by critics and defenders alike. Radical empiricism, unlike its more traditional ancestors, undercuts the gaps between theory and practice, and subjective and objective accounts of experience, and in so doing provides the metaphysical and epistemological basis for a thoroughgoing empirical naturalism in ethics. Pragmatism's strength as an approach to moral problems thus emerges as a result of a much wider array of resources than contemporary interpreters have acknowledged, which makes it a richer, deeper framework for understanding moral deliberation in general and bioethical decision making in particular.

  2. The significance of internet communication in public deliberation:

    OpenAIRE

    Rasmussen, Terje

    2009-01-01

    The article addresses recent structural changes in the public sphere related to media as platforms for debate and deliberation. New media platforms for communication lead to changes in the communication structure itself. This can easily be seen in the differentiation processes of the public sphere that is now taking place: The differentiation of topics, styles and actors is an astonishing phenomenon, is constantly a topic of debate in itself, often labelled as both decay and democratisation. ...

  3. Deliberate Self-Harm in Adolescence: A Challenge for Schools

    Science.gov (United States)

    Best, Ron

    2006-01-01

    Acts of deliberate self-harm (DSH) by adolescents are thought to be on the increase. Many of those who self-harm are of school age and it is to be expected that schools (and their teachers) will be aware of the problem and will respond appropriately as part of their pastoral-care provision. However, a recent survey of research in pastoral care and…

  4. Air Force Leadership Study: The Need for Deliberate Development

    Science.gov (United States)

    2012-02-01

    Abraham Maslow , once the basic needs of survival and security are met, people concern themselves with higher needs like affection, be- longing, the...maintaining the data needed , and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of...Study: The Need for Deliberate Development 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  5. Evaluation and perceived results of moral case deliberation: A mixed methods study

    NARCIS (Netherlands)

    Janssens, R.; van Zadelhoff, E.; van Loo, G.; Widdershoven, G.A.; Molewijk, A.C.

    2015-01-01

    Background: Moral case deliberation is increasingly becoming part of various Dutch healthcare organizations. Although some evaluation studies of moral case deliberation have been carried out, research into the results of moral case deliberation within aged care is scarce. Research questions: How did

  6. Neural basis of moral verdict and moral deliberation

    Science.gov (United States)

    Borg, Jana Schaich; Sinnott-Armstrong, Walter; Calhoun, Vince D.; Kiehl, Kent A.

    2011-01-01

    How people judge something to be morally right or wrong is a fundamental question of both the sciences and the humanities. Here we aim to identify the neural processes that underlie the specific conclusion that something is morally wrong. To do this, we introduce a novel distinction between “moral deliberation,” or the weighing of moral considerations, and the formation of a “moral verdict,” or the commitment to one moral conclusion. We predict and identify hemodynamic activity in the bilateral anterior insula and basal ganglia that correlates with committing to the moral verdict “this is morally wrong” as opposed to “this is morally not wrong,” a finding that is consistent with research from economic decision-making. Using comparisons of deliberation-locked vs. verdict-locked analyses, we also demonstrate that hemodynamic activity in high-level cortical regions previously implicated in morality—including the ventromedial prefrontal cortex, posterior cingulate, and temporoparietal junction—correlates primarily with moral deliberation as opposed to moral verdicts. These findings provide new insights into what types of processes comprise the enterprise of moral judgment, and in doing so point to a framework for resolving why some clinical patients, including psychopaths, may have intact moral judgment but impaired moral behavior. PMID:21590588

  7. Assault on the USS LIBERTY: Deliberate Action or Tragic Accident?

    Science.gov (United States)

    2007-03-30

    fear of an Egyptian attack from the sea compounded with the explosion at al-‘Arish, set the events into motion.74 The torpedo boats miscalculated...differences with the USS Liberty. The Liberty is 200 feet longer, covered with antennas, and has a state-of-the-art parabolic satellite dish.85 Perhaps...collection position.] 14 Ibid, 13. 15 Ibid, 14. 16 William D. Gerhard and Henry W. Millington, Attack on a Sigint Collector , the U.S.S Liberty

  8. How do different definitions of night shift affect the exposure assessment of night work?

    DEFF Research Database (Denmark)

    Garde, Anne Helene; Hansen, Johnni; Kolstad, Henrik A

    2016-01-01

    the reference definition (at least 3 h of work between 24:00 and 05:00) and definitions using a period during the night. The overlap with definitions based on starting and ending time was less pronounced (64-71 %). The proportion of classified night shifts differs little when night shifts are based...

  9. Night-vision goggles for night-blind subjects : subjective evaluation after 2 years of use

    NARCIS (Netherlands)

    Hartong, D. T.; Kooijman, A. C.

    Purpose: To evaluate the usefulness of night-vision goggles (NVG) for night-blind subjects after 1 and 2 years of use. Methods: Eleven night-blind subjects with retinitis pigmentosa used NVG for a 2-year period. At the end of each year, they were requested to fill-in two questionnaires regarding

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Working night shifts affects surgeons' biological rhythm

    DEFF Research Database (Denmark)

    Amirian, Ilda; Andersen, Lærke T; Rosenberg, Jacob

    2015-01-01

    BACKGROUND: Chronic sleep deprivation combined with work during the night is known to affect performance and compromise residents' own safety. The aim of this study was to examine markers of circadian rhythm and the sleep-wake cycle in surgeons working night shifts. METHODS: Surgeons were monitor...

  13. Definitions of night eating in adolescent girls

    NARCIS (Netherlands)

    Striegel-Moore, RH; Thompson, D; Franko, DL; Barton, B; Affenito, S; Schreiber, GB; Daniels, [No Value

    Objective: To describe the prevalence of night eating in a community cohort of black and white girls, using different definitions of night eating as described in the literature. Research Methods and Procedures: Three-day food diaries collected as part of the National Growth and Health Study were

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  16. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  17. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  19. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  20. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  2. Homicides with direct and indirect links to the night-time economy.

    Science.gov (United States)

    Tomsen, Stephen

    2018-06-11

    Alcohol use and homicide are a wide community concern with particular interest in understanding and preventing attacks (e.g. 'one punch' male on male attacks) in commercial nightlife settings with high levels of collective drinking. There is insufficient knowledge of the long-term patterns in this violence or the relationship between public drinking and flow on violence in other social settings. Alcohol-related homicides were those in which alcohol consumption was a contributing factor. Those also linked to purchase or consumption in locations where alcohol is sold after dark were classified as night-time economy related. The study comprised a first-hand analysis of files in the archive of the Australian National Homicide Monitoring Program in 2 years with a decade gap (1998/1999-2007/2008), and it classified 73 of all 238 alcohol-related incidents by direct or indirect relation to public nightlife settings. Related homicides in these years were not highly concentrated in developed night-time economies, but more spread outside major nightlife zones. Indirectly related killings were even more dispersed and included more women victims killed in domestic settings. There is a consistent though dispersed relationship between heavy public drinking at night and homicide. Concerns about homicide and night-time drinking leisure with mostly male victims attacked in well-known areas of busy city nightlife, must also consider the broader gendered patterns of 'flow on' nightlife-related incidents, including fatal semi-private and domestic violence that is indirectly but importantly related to drinking and alcohol purchase in public commercial nightlife. © 2018 Australasian Professional Society on Alcohol and other Drugs.

  3. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  4. Vaginismus and dyspareunia: automatic vs. deliberate disgust responsivity.

    Science.gov (United States)

    Borg, Charmaine; de Jong, Peter J; Schultz, Willibrord Weijmar

    2010-06-01

    The difficulty of penetration experienced in vaginismus and dyspareunia may at least partly be due to a disgust-induced defensive response. To examine if sex stimuli specifically elicit: (i) automatic disgust-related memory associations; (ii) physiological disgust responsivity; and/or (iii) deliberate expression of disgust/threat. Two single target Implicit Association Task (st-IAT) and electromyography (EMG) were conducted on three groups: vaginismus (N = 24), dyspareunia (N = 24), and control (N = 31) group. st-IAT, to index their initial disgust-related associations and facial EMG for the m. levator labii and m. corrugator supercilii regions. Both clinical groups showed enhanced automatic sex-disgust associations. As a unique physiological expression of disgust, the levator activity was specifically enhanced for the vaginismus group, when exposed to a women-friendly SEX video clip. Also at the deliberate level, specifically the vaginismus group showed enhanced subjective disgust toward SEX pictures and the SEX clip, along with higher threat responses. Supporting the view that disgust is involved in vaginismus and dyspareunia, for both, clinical groups' sex stimuli automatically elicited associations with disgust. Particularly for the vaginismus group, these initial disgust associations persisted during subsequent validation processes and were also evident at the level of facial expression and self-report data. Findings are consistent with the notion that uncontrollable activated associations are involved in eliciting defensive reactions at the prospect of penetration seen in both conditions. Whereas deliberate attitudes, usually linked with the desire for having intercourse, possibly generate the distinction (e.g., severity) between these two conditions.

  5. Organization and management of ATLAS nightly builds

    International Nuclear Information System (INIS)

    Luehring, F; Obreshkov, E; Quarrie, D; Rybkine, G; Undrus, A

    2010-01-01

    The automated multi-platform software nightly build system is a major component in the ATLAS collaborative software organization, validation and code approval schemes. Code developers from ATLAS participating Institutes spread all around the world use about 30 branches of nightly releases for testing new packages, verification of patches to existing software, and migration to new platforms and compilers. The nightly releases lead up to, and are the basis of, stable software releases used for data processing worldwide. The ATLAS nightly builds are managed by the fully automated NICOS framework on the computing farm with 44 powerful multiprocessor nodes. The ATN test tool is embedded within the nightly system and provides results shortly after full compilations complete. Other test frameworks are synchronized with NICOS jobs and run larger scale validation jobs using the nightly releases. NICOS web pages dynamically provide information about the progress and results of the builds. For faster feedback, E-mail notifications about nightly releases problems are automatically distributed to the developers responsible.

  6. The use of moral deliberation in empirical research in bioethics

    Directory of Open Access Journals (Sweden)

    Elma Zoboli

    2016-10-01

    Full Text Available The article presents an integrated empirical ethics research project that used the moral deliberation, according to the theoretical and philosophical conception, and methodical proposal of Diego Gracia, as a theoretical and methodological framework. The application showed the potential to realize the dynamics of the studied object in real life, making it possible, from the situation presented in the vignettes, for participants to include what they considered for dealing with the conflict of values. It also made the integration of philosophical and empirical approaches in bioethics research possible. The analytical category of prudence allowed the results to be assessed in a critical and comprehensive way.

  7. Public Deliberation on Government-managed Social Media

    DEFF Research Database (Denmark)

    Medaglia, Rony; Zhu, Demi

    2017-01-01

    – characterised by exposure to different opinions, mutual understanding, and reasonableness – or hinder them, resulting in increased homophily and polarisation. Using the theoretical lens of public deliberation, this study investigates attitudinal and cognitive aspects of user conversations on government......-managed social media accounts. Drawing on a survey of 417 users of the Chinese social media platform Weibo, our findings show that interactions on social media are mostly non-dialogical and non-creative in nature, and characterised by homophily and polarisation, even though users perceive their interactions...

  8. Night sky a falcon field guide

    CERN Document Server

    Nigro, Nicholas

    2012-01-01

    Night Sky: A Falcon Field Guide covers both summer and winter constellations, planets, and stars found in the northern hemisphere. Conveniently sized to fit in a pocket and featuring detailed photographs, this informative guide makes it easy to identify objects in the night sky even from one's own backyard. From information on optimal weather conditions, preferred viewing locations, and how to use key tools of the trade, this handbook will help you adeptly navigate to and fro the vast and dynamic nighttime skies, and you'll fast recognize that the night sky's the limit.

  9. Late night activity regarding stroke codes: LuNAR strokes.

    Science.gov (United States)

    Tafreshi, Gilda; Raman, Rema; Ernstrom, Karin; Rapp, Karen; Meyer, Brett C

    2012-08-01

    There is diurnal variation for cardiac arrest and sudden cardiac death. Stroke may show a similar pattern. We assessed whether strokes presenting during a particular time of day or night are more likely of vascular etiology. To compare emergency department stroke codes arriving between 22:00 and 8:00 hours (LuNAR strokes) vs. others (n-LuNAR strokes). The purpose was to determine if late night strokes are more likely to be true strokes or warrant acute tissue plasminogen activator evaluations. We reviewed prospectively collected cases in the University of California, San Diego Stroke Team database gathered over a four-year period. Stroke codes at six emergency departments were classified based on arrival time. Those arriving between 22:00 and 8:00 hours were classified as LuNAR stroke codes, the remainder were classified as 'n-LuNAR'. Patients were further classified as intracerebral hemorrhage, acute ischemic stroke not receiving tissue plasminogen activator, acute ischemic stroke receiving tissue plasminogen activator, transient ischemic attack, and nonstroke. Categorical outcomes were compared using Fisher's Exact test. Continuous outcomes were compared using Wilcoxon's Rank-sum test. A total of 1607 patients were included in our study, of which, 299 (19%) were LuNAR code strokes. The overall median NIHSS was five, higher in the LuNAR group (n-LuNAR 5, LuNAR 7; P=0·022). There was no overall differences in patient diagnoses between LuNAR and n-LuNAR strokes (P=0·169) or diagnosis of acute ischemic stroke receiving tissue plasminogen activator (n-LuNAR 191 (14·6%), LuNAR 42 (14·0%); P=0·86). Mean arrival to computed tomography scan time was longer during LuNAR hours (n-LuNAR 54·9±76·3 min, LuNAR 62·5±87·7 min; P=0·027). There was no significant difference in 90-day mortality (n-LuNAR 15·0%, LuNAR 13·2%; P=0·45). Our stroke center experience showed no difference in diagnosis of acute ischemic stroke between day and night stroke codes. This

  10. TBT recommends : Courtney Pine. Hansa disco night

    Index Scriptorium Estoniae

    2005-01-01

    Inglise jazzsaksofonisti Courtney Pine heliplaadi "Resistance" esitluskontserdist 15. dets. Rock Cafés Tallinnas. Inglise laulja Chris Norman läti ansamblitega üritusel "Hansa disco night Nr.4" 9. dets. Kipsala Hallis Riias

  11. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  13. Solar Neutrino Day-Night Effect

    International Nuclear Information System (INIS)

    Blennow, Mattias; Ohlsson, Tommy; Snellman, Hakan

    2005-01-01

    We summarize the results of Ref. [M. Blennow, T. Ohlsson and H. Snellman, Phys. Rev. D 69 (2004) 073006, hep-ph/0311098] in which we determine the effects of three flavor mixing on the day-night asymmetry in the flux of solar neutrinos. Analytic methods are used to determine the difference in the day and night solar electron neutrino survival probabilities and numerical methods are used to determine the effect of three flavor mixing at detectors

  14. Minor Characters in William Shakespeare's Twelfth Night and A Midsummer Night's Dream

    Directory of Open Access Journals (Sweden)

    Zahraa Adnan Baqer

    2018-01-01

    Full Text Available This paper aims at discussing the role of the minor characters in William Shakespeare's Twelfth Night and A Midsummer Night's Dream. The study assumes that without the first group of minor characters, associated with Olivia, the play Twelfth Night would lose much of its humor, and without the second group, associated with Sebastian, the play would fall apart. On the other hand, in Shakespeare's A Midsummer Night's Dream minor characters play important roles, without them, the action dose not ran smoothly, or does not ran at all. The paper falls into three sections. Section one deals with the role of each minor character in Twelfth Night.  Section two focuses on the minor characters in A Midsummer Night's Dream. Section three is a conclusion which sums up the findings of the study.

  15. Menstrual characteristics and night work among nurses.

    Science.gov (United States)

    Moen, Bente E; Baste, Valborg; Morken, Tone; Alsaker, Kjersti; Pallesen, Ståle; Bjorvatn, Bjørn

    2015-01-01

    Night work has been associated with adverse effects in terms of reproductive health. Specifically, menstruation has been suggested to be negatively impacted by night work, which again may influence fertility. This study investigated whether working nights is related to menstrual characteristics and if there is a relationship between shift work disorder (SWD) and menstruation. The study was cross-sectional, response rate 38%. The sample comprised female nurses who were members of the Norwegian Nurses Association; below 50 yr of age, who were not pregnant, did not use hormonal pills or intrauterine devices and who had not reached menopause (n=766). The nurses answered a postal survey including questions about night work and menstrual characteristics. Fifteen per cent reported to have irregular menstruations. Thirty-nine per cent of the nurses were classified as having SWD. Logistic regression analyses concerning the relationship between irregular menstruations and night work did not show any associations. Furthermore, no associations were found between cycle length or bleeding period and night work parameters. No associations were found between menstrual characteristics and SWD.

  16. Night shift work exposure profile and obesity: Baseline results from a Chinese night shift worker cohort

    Science.gov (United States)

    Feng, Wenting; Wang, Feng; Zhang, Liuzhuo; Wu, Zijun; Li, Zhimin; Zhang, Bo; He, Yonghua; Xie, Shaohua; Li, Mengjie; Fok, Joan P. C.; Tse, Gary; Wong, Martin C. S.; Tang, Jin-ling; Wong, Samuel Y. S.; Vlaanderen, Jelle; Evans, Greg; Vermeulen, Roel; Tse, Lap Ah

    2018-01-01

    Aims This study aimed to evaluate the associations between types of night shift work and different indices of obesity using the baseline information from a prospective cohort study of night shift workers in China. Methods A total of 3,871 workers from five companies were recruited from the baseline survey. A structured self-administered questionnaire was employed to collect the participants’ demographic information, lifetime working history, and lifestyle habits. Participants were grouped into rotating, permanent and irregular night shift work groups. Anthropometric parameters were assessed by healthcare professionals. Multiple logistic regression models were used to evaluate the associations between night shift work and different indices of obesity. Results Night shift workers had increased risk of overweight and obesity, and odds ratios (ORs) were 1.17 (95% CI, 0.97–1.41) and 1.27 (95% CI, 0.74–2.18), respectively. Abdominal obesity had a significant but marginal association with night shift work (OR = 1.20, 95% CI, 1.01–1.43). A positive gradient between the number of years of night shift work and overweight or abdominal obesity was observed. Permanent night shift work showed the highest odds of being overweight (OR = 3.94, 95% CI, 1.40–11.03) and having increased abdominal obesity (OR = 3.34, 95% CI, 1.19–9.37). Irregular night shift work was also significantly associated with overweight (OR = 1.56, 95% CI, 1.13–2.14), but its association with abdominal obesity was borderline (OR = 1.26, 95% CI, 0.94–1.69). By contrast, the association between rotating night shift work and these parameters was not significant. Conclusion Permanent and irregular night shift work were more likely to be associated with overweight or abdominal obesity than rotating night shift work. These associations need to be verified in prospective cohort studies. PMID:29763461

  17. Night shift work exposure profile and obesity: Baseline results from a Chinese night shift worker cohort.

    Science.gov (United States)

    Sun, Miaomiao; Feng, Wenting; Wang, Feng; Zhang, Liuzhuo; Wu, Zijun; Li, Zhimin; Zhang, Bo; He, Yonghua; Xie, Shaohua; Li, Mengjie; Fok, Joan P C; Tse, Gary; Wong, Martin C S; Tang, Jin-Ling; Wong, Samuel Y S; Vlaanderen, Jelle; Evans, Greg; Vermeulen, Roel; Tse, Lap Ah

    2018-01-01

    This study aimed to evaluate the associations between types of night shift work and different indices of obesity using the baseline information from a prospective cohort study of night shift workers in China. A total of 3,871 workers from five companies were recruited from the baseline survey. A structured self-administered questionnaire was employed to collect the participants' demographic information, lifetime working history, and lifestyle habits. Participants were grouped into rotating, permanent and irregular night shift work groups. Anthropometric parameters were assessed by healthcare professionals. Multiple logistic regression models were used to evaluate the associations between night shift work and different indices of obesity. Night shift workers had increased risk of overweight and obesity, and odds ratios (ORs) were 1.17 (95% CI, 0.97-1.41) and 1.27 (95% CI, 0.74-2.18), respectively. Abdominal obesity had a significant but marginal association with night shift work (OR = 1.20, 95% CI, 1.01-1.43). A positive gradient between the number of years of night shift work and overweight or abdominal obesity was observed. Permanent night shift work showed the highest odds of being overweight (OR = 3.94, 95% CI, 1.40-11.03) and having increased abdominal obesity (OR = 3.34, 95% CI, 1.19-9.37). Irregular night shift work was also significantly associated with overweight (OR = 1.56, 95% CI, 1.13-2.14), but its association with abdominal obesity was borderline (OR = 1.26, 95% CI, 0.94-1.69). By contrast, the association between rotating night shift work and these parameters was not significant. Permanent and irregular night shift work were more likely to be associated with overweight or abdominal obesity than rotating night shift work. These associations need to be verified in prospective cohort studies.

  18. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  19. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  20. Night-to-night arousal variability and interscorer reliability of arousal measurements.

    Science.gov (United States)

    Loredo, J S; Clausen, J L; Ancoli-Israel, S; Dimsdale, J E

    1999-11-01

    Measurement of arousals from sleep is clinically important, however, their definition is not well standardized, and little data exist on reliability. The purpose of this study is to determine factors that affect arousal scoring reliability and night-to-night arousal variability. The night-to-night arousal variability and interscorer reliability was assessed in 20 subjects with and without obstructive sleep apnea undergoing attended polysomnography during two consecutive nights. Five definitions of arousal were studied, assessing duration of electroencephalographic (EEG) frequency changes, increases in electromyographic (EMG) activity and leg movement, association with respiratory events, as well as the American Sleep Disorders Association (ASDA) definition of arousals. NA. NA. NA. Interscorer reliability varied with the definition of arousal and ranged from an Intraclass correlation (ICC) of 0.19 to 0.92. Arousals that included increases in EMG activity or leg movement had the greatest reliability, especially when associated with respiratory events (ICC 0.76 to 0.92). The ASDA arousal definition had high interscorer reliability (ICC 0.84). Reliability was lowest for arousals consisting of EEG changes lasting <3 seconds (ICC 0.19 to 0.37). The within subjects night-to-night arousal variability was low for all arousal definitions In a heterogeneous population, interscorer arousal reliability is enhanced by increases in EMG activity, leg movements, and respiratory events and decreased by short duration EEG arousals. The arousal index night-to-night variability was low for all definitions.

  1. Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A...Program Name Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A) DoD Component Air Force Responsible Office Program...APB) dated March 9, 2015 DCAPES Inc 2A 2016 MAR UNCLASSIFIED 4 Program Description Deliberate and Crisis Action Planning and Execution Segments

  2. Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B...Information Program Name Deliberate and Crisis Action Planning and Execution Segments Increment 2B (DCAPES Inc 2B) DoD Component Air Force Responsible Office...been established. DCAPES Inc 2B 2016 MAR UNCLASSIFIED 4 Program Description Deliberate and Crisis Action Planning and Execution Segments (DCAPES) is

  3. Incidence Rates of Deliberate Self-Harm in Denmark 1994–2011

    DEFF Research Database (Denmark)

    Morthorst, Britt Reuter; Soegaard, Bodil; Nordentoft, Merete

    2016-01-01

    Background: The validity and reliability of suicide statistics have been questioned and few nationwide studies of deliberate selfharm have been presented. Aim: To calculate rates of deliberate self-harm in Denmark in order to investigate trends and assess the reliability of hospital records...... incidence of deliberate self-harm among young Danish women was observed, despite detection bias. An improved registration procedure of suicidal behavior is needed....

  4. Non-Conscious vs. Deliberate Dynamic Decision-Making—A Pilot Experiment

    OpenAIRE

    Andreas Größler; Etiënne Rouwette; Jac Vennix

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for deliberate cognitive processing), considerate decision-making (relatively long time for deliberate cognitive processing), and distracted decision-making (time for non-conscious cognitive processing ...

  5. Non-conscious vs. deliberate dynamic decision-making—a pilot experiment

    OpenAIRE

    Grössler, A.; Rouwette, E.A.J.A.; Vennix, J.A.M.; Größler, A.

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for deliberate cognitive processing), considerate decision-making (relatively long time for deliberate cognitive processing), and distracted decision-making (time for non-conscious cognitive processing ...

  6. In the public interest: assessing expert and stakeholder influence in public deliberation about biobanks.

    Science.gov (United States)

    MacLean, Samantha; Burgess, Michael M

    2010-07-01

    Providing technical and experiential information without overwhelming participants' perspectives presents a major challenge to public involvement in policy decisions. This article reports the design and analysis of a case study on incorporating expert and stakeholder knowledge without including them as deliberators, while supporting deliberative participants' ability to introduce and critically assess different perspectives. Analysis of audio-recorded deliberations illustrates how expert and stakeholder knowledge was cited, criticized and incorporated into deliberations. In conclusion, separating experts and stakeholders from deliberations may be an important prima facie principle when the goal is to enhance citizen representation on technical issues and related policy.

  7. Fairness requires deliberation: The primacy of economic over social considerations

    Directory of Open Access Journals (Sweden)

    Guy eHochman

    2015-06-01

    Full Text Available While both economic and social considerations of fairness and equity play an important role in financial decision-making, it is not clear which of these two motives is more primal and immediate and which one is secondary and slow. Here we used variants of the ultimatum game to examine this question. Experiment 1 shows that acceptance rate of unfair offers increases when participants are asked to base their choice on their gut-feelings, as compared to when they thoroughly consider the available information. In line with these results, Experiments 2 and 3 provide process evidence that individuals prefer to first examine economic information about their own utility rather than social information about equity and fairness, even at the price of foregoing such social information. Our results suggest that people are more economically rational at the core, but social considerations (e.g., inequality aversion require deliberation, which under certain conditions override their self-interested impulses.

  8. Democracy and the Internet: Access, Engagement and Deliberation

    Directory of Open Access Journals (Sweden)

    Roman Gerodimos

    2005-12-01

    Full Text Available The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust, meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere.

  9. Fairness requires deliberation: the primacy of economic over social considerations

    Science.gov (United States)

    Hochman, Guy; Ayal, Shahar; Ariely, Dan

    2015-01-01

    While both economic and social considerations of fairness and equity play an important role in financial decision-making, it is not clear which of these two motives is more primal and immediate and which one is secondary and slow. Here we used variants of the ultimatum game to examine this question. Experiment 1 shows that acceptance rate of unfair offers increases when participants are asked to base their choice on their gut-feelings, as compared to when they thoroughly consider the available information. In line with these results, Experiments 2 and 3 provide process evidence that individuals prefer to first examine economic information about their own utility rather than social information about equity and fairness, even at the price of foregoing such social information. Our results suggest that people are more economically rational at the core, but social considerations (e.g., inequality aversion) require deliberation, which under certain conditions override their self-interested impulses. PMID:26106342

  10. Deliberate interventions in the availability and circulation of practice elements

    DEFF Research Database (Denmark)

    Quitzau, Maj-Britt; Hoffmann, Birgitte

    competences in relation to the heating system. Otherwise, the circulating ideas about comfort and the daily practices performed in the house remained unchanged. On the basis of these findings, we highlight how the considerations done by the urban government prior to the project and the negotiations undertaken...... of practices can help to inform policy makers in this regard, there is a need for more detailed insight into how such deliberate interventions are performed in practice and intersect with the availability and circulation of practice elements, among others. The aim of this paper is to explore the considerations...... area by setting up very strict requirements to the energy performance of the new buildings. Through qualitative interviews with the urban government, the building companies and the involved families, we have studied how this intervention hindered the circulation of certain practice elements, while...

  11. Fairness requires deliberation: the primacy of economic over social considerations.

    Science.gov (United States)

    Hochman, Guy; Ayal, Shahar; Ariely, Dan

    2015-01-01

    While both economic and social considerations of fairness and equity play an important role in financial decision-making, it is not clear which of these two motives is more primal and immediate and which one is secondary and slow. Here we used variants of the ultimatum game to examine this question. Experiment 1 shows that acceptance rate of unfair offers increases when participants are asked to base their choice on their gut-feelings, as compared to when they thoroughly consider the available information. In line with these results, Experiments 2 and 3 provide process evidence that individuals prefer to first examine economic information about their own utility rather than social information about equity and fairness, even at the price of foregoing such social information. Our results suggest that people are more economically rational at the core, but social considerations (e.g., inequality aversion) require deliberation, which under certain conditions override their self-interested impulses.

  12. Investigating the "self" in deliberate self-harm.

    Science.gov (United States)

    Adams, Joanna; Rodham, Karen; Gavin, Jeff

    2005-12-01

    In this study, the authors explored how a group of young people aged 16 to 26 years (who identified themselves as having engaged in deliberate self-harm) made sense of the self by conducting two online focus groups and four e-mail interviews. They analyzed data using interpretive phenomenological analysis. The concept of validation was the primary means of making sense of the self and concerned the desire to be considered legitimate and of worth. This desire was clearly evident across three realms of conflict: (a) the intrinsic or extrinsic self, which marked the distinction between objective fact and subjective opinion; (b) the accepted or denied self; and (c) the notion of normality. It is possible that having one's denied self validated online might lead to an exacerbation of an individual's self-harming behavior. Further work is needed to explore the effects of online discussion forums on such taboo forms of behavior.

  13. Deliberation and Scale in Mekong Region Water Governance

    Science.gov (United States)

    Dore, John; Lebel, Louis

    2010-07-01

    Understanding the politics of deliberation, scales, and levels is crucial to understanding the social complexity of water-related governance. Deliberative processes might complement and inform more conventional representational and bureaucratic approaches to planning and decision-making. However, they are also subject to scale and level politics, which can confound institutionalized decision-making. Scale and level contests arise in dialogues and related arenas because different actors privilege particular temporal or spatial scales and levels in their analysis, arguments, and responses. Scale contests might include whether to privilege administrative, hydrological, ecosystem, or economic boundaries. Level contests might include whether to privilege the subdistrict or the province, the tributary watershed or the international river basin, a river or a biogeographic region, and the local or the regional economy. In the Mekong Region there is a recurrent demand for water resources development projects and major policies proposed by governments and investors to be scrutinized in public. Deliberative forms of engagement are potentially very helpful because they encourage supporters and critics to articulate assumptions and reasoning about the different opportunities and risks associated with alternative options, and in doing so, they often traverse and enable higher-quality conversations within and across scales and within and between levels. Six case studies from the Mekong Region are examined. We find evidence that scale and level politics affects the context, process, content, and outcomes of deliberative engagement in a region where public deliberation is still far from being a norm, particularly where there are sensitive and far-reaching choices to be made about water use and energy production.

  14. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  15. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  16. When and Why Java was Deliberated from the Slavery?

    Directory of Open Access Journals (Sweden)

    Djoko Marihandono

    2017-07-01

    From the French point of view, Java would be set as centre of the French strategy in the effort to reoccupy India as before. According to Napoleon Bonaparte, India had natural resources more than the riches of all European kingdoms. So, the position of Java island geographically was very important because of his location was directly in front of India Ocean, and the military troupes could directly attack India.  Java which was very rich of the natural resources as wood as the basic materials of ship industry, potassium nitrate, as the materials of ammunition and the Javanese who had the very special endurance were considered by the Emperor as a very ideal island. The Javanese could compete the Sepoy soldiers, the Indian indigenous soldiers formed by the British. So, Napoleon Bonaparte considered that the Javanese would be prepared to realize the Napoleonic strategy. Java had to be saved from the British attack.

  17. Choking at Night: A Case of Opercular Nocturnal Frontal Lobe Epilepsy

    Directory of Open Access Journals (Sweden)

    Geetanjali Rathore

    2013-01-01

    Full Text Available Frontal lobe seizures have a tendency to occur in sleep and in most cases occur exclusively insleep; these individuals are said to have nocturnal frontal lobe (NFLE. NFLE can be difficult to distinguish clinically from various other sleep disorders, particularly parasomnias, which also present with paroxysmal motor activity in sleep. Interictal and ictal EEG findings are frequently unremarkable or nonspecific in both parasomnias and NFLE making the diagnosis even more difficult. Nocturnal epilepsy should be suspected in patients with paroxysmal events at night characterized by high frequency, repetition, extrapyramidal features, and marked stereotypy of attacks. Here we present a 13-year-old female who was extensively worked up for choking episodes at night. On repeat video EEG she was found to have frontal opercular seizures. Once on Carbamazepine, her seizures completely resolved.

  18. Supportive leadership in Swedish community night nursing.

    Science.gov (United States)

    Gustafsson, Christine; Fagerberg, Ingegerd; Asp, Margareta

    2010-10-01

    The aim of the present study was to examine the support night nurses' give to staff in community night nursing. Studies have shown that support given to staff is one of night registered nurses' (RNs') experiences of the meaning of caring. This support, that community RNs display for staff in night-time care, is sparsely described. All community night-duty nurses in a medium-sized municipal in Sweden participated in the present study. Thematic content analysis was used to analyse data from observations. The support given by RNs to staff is described using three themes: (1) a conditional supporting stance, (2) preparing propitious conditions for caring and (3) confidence in the abilities of individual staff members and adaptation to their individual needs. The results reveal that RNs consider support to staff in terms of nursing leadership. Out of 'concern for the staff' the RNs try to be there for them, which corresponds to nursing leadership. Such concern also arises from the RNs' awareness that by giving support to staff this affects the staffs' caring for older people. The current municipal social care organization of community nursing of older people in which RNs have extensive responsibilities with insufficient control, is a working condition with a risk for decreased quality of care and a high risk for work-related stress syndrome. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.

  19. [Shift and night work and mental health].

    Science.gov (United States)

    Sancini, Angela; Ciarrocca, Manuela; Capozzella, Assunta; Corbosiero, Paola; Fiaschetti, Maria; Caciari, Tiziana; Cetica, Carlotta; Scimitto, Lara; Ponticiello, Barnaba Giuseppina; Tasciotti, Zaira; Schifano, Maria Pia; Andreozzit, Giorgia; Tomei, Francesco; Tomei, Gianfranco

    2012-01-01

    Aim of our study was to evaluate the influence that shift work and night work could have on mental health. A review of literary articles from 1990 to 2011 on shift work and night work was carried out. The results of this review confirmed that the shift work and night work affect mental health with the onset of neuropsychological disorders such as mood disorders, anxiety, nervousness, depressive anxiety syndromes, chronic fatigue and chronic insomnia irritability, sleep disturbances, reduction in levels of attention, cognitive impairments, alteration of circadian rhythm. Night work and shift work cause severe desynchronization of the cronobiological rhythms and a disruption of social life with negative effects on performance at work, on health and on social relationships. In the light of these results and recognizing shift work and night work as risk factors for the health of workers is necessary to implement preventive and periodic health checks by the occupational doctor to ensure the health and safety of workers taking account of the different environmental and individual factors.

  20. What is the preferred number of consecutive night shifts?

    DEFF Research Database (Denmark)

    Nabe-Nielsen, Kirsten; Jensen, Marie Aarrebo; Hansen, Åse Marie

    2016-01-01

    % preferred '2 + 2' and 26% preferred '7 + 7'. Participants, who preferred longer spells of night work experienced that night work was less demanding, found it easier to sleep at different times of the day, and were more frequently evening types compared with participants who preferred shorter spells of night...... the longer spells of night work found night work less demanding, found it easier to sleep at different times of the day, and were more frequently evening types....

  1. Multitudes attend the Night of Science

    CERN Multimedia

    2006-01-01

    The Night of Science, which took place in the Parc de la Perle du Lac in Geneva last weekend, was a great success, with 30 000 visitors attending according to the organisers. Many curious people flocked to the stands and animations until late on Saturday night and all afternoon on Sunday. The CERN stand (photo) received a great amount of interest from participants. Both kids and adults discovered the activities of the Laboratory and the data-processing revolution initiated by CERN, from the Web to the Computing Grid. Hats off to the CERN collaborators in the Communication Group and IT Department who made this event a success.

  2. Sira Nights as a Recreational Tourism Activity

    OpenAIRE

    Barakazı, Mahmut; Önçel, Sibel

    2017-01-01

    In terms of culture, art and gastronomy, Urfa sira nights are the basis for an important recreational activity. Recreational activities in these regions provide tourism awareness, as well as the benefits of introducing local Urfa cuisine, which is very rich in culinary culture, and Gastronomy leads to the recognition of tourism in the region. The aim of this research is to encourage recreational activities by promoting recreational activities such as Urfa sira 'nights' effects on ga...

  3. In search of online deliberation : Towards a new method for examining the quality of online discussions

    NARCIS (Netherlands)

    Graham, Todd; Witschge, Tamara

    2003-01-01

    Many advocates of deliberative democracy see in the Internet a new opportunity for the development of public spaces, public spheres, and places where deliberation can take place. An important element of the notion of the public sphere in general and of deliberation specifically, is the quality of

  4. Cultivating Mathematical Skills: From Drill-and-Practice to Deliberate Practice

    Science.gov (United States)

    Lehtinen, Erno; Hannula-Sormunen, Minna; McMullen, Jake; Gruber, Hans

    2017-01-01

    Contemporary theories of expertise development highlight the crucial role of deliberate practice in the development of high level performance. Deliberate practice is practice that intentionally aims at improving one's skills and competencies. It is not a mechanical or repetitive process of making performance more fluid. Instead, it involves a…

  5. Ethical case deliberation on the ward. A comparison of four methods.

    NARCIS (Netherlands)

    Steinkamp, N.L.; Gordijn, B.

    2003-01-01

    The objective of this article is to analyse and compare four methods of ethical case deliberation. These include Clinical Pragmatism, The Nijmegen Method of ethical case deliberation, Hermeneutic dialogue, and Socratic dialogue. The origin of each method will be briefly sketched. Furthermore, the

  6. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  7. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  8. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  9. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  10. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  11. Deliberative Democracy, Critical Thinking, and the Deliberating Individual: empirical challenges to the reasonability of the citizen

    Directory of Open Access Journals (Sweden)

    Juho Ritola

    2015-01-01

    Full Text Available In this essay, I first discuss the conditions set by theorists of democratic deliberation on proper deliberation. These conditions call for reasoned decisions from mutually acceptable premises. Next, I present the ideal of critical thinking that should guide the citizen in this deliberation. I then examine the empirical literature on human reasoning. Some research results in the empirical literature paint a bleak picture of human rationality: we fall victim to heuristics and biases, persevere in our beliefs in the face of contrary evidence, and justify our moral judgments by post hoc-reasoning. In addition, the deliberating groups have problems of their own. The groups may, for example, amplify errors or fall victim to information cascades.  Though these epistemically detrimental processes can be overcome, they do present a challenge to our rationality. The essay concludes by arguing that the empirical evidence in fact supports an internalistic approach to group deliberation, a claim challenged by Solomon (2006.

  12. What’s There Not to ‘Like’? Sustainability Deliberations on Facebook

    Directory of Open Access Journals (Sweden)

    Roy Bendor

    2012-10-01

    Full Text Available Social media are considered ideal means to promote inclusive political participation by “reaching citizens where they are” in scalable and cost-effective ways. However, with all the excitement about the new virtual public sphere, little attention is given to the technical mediation itself – the affordances of e-deliberation platforms and the kind of interactions they support. In response, this paper aims to thicken the account of the interrelated political and technological contexts of e-deliberation. Using recent Facebook deliberations on sustainable transportation in Vancouver as our example, we argue that different rationales for public participation in policymaking animate different approaches to discourse, which, in turn, inform and are affected by different design and use strategies for e-deliberation platforms. Our argument suggests that the design affordances of e-deliberation represent opportunities to promote or curtail certain visions of a political culture of sustainability.

  13. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  14. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  15. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  16. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  17. Night-life of Bryde's whales

    DEFF Research Database (Denmark)

    Izadi, Sahar; Johnson, Mark; Aguilar de Soto, Natacha

    2018-01-01

    logging tags on resident Bryde'swhales in a busy gulf to study their daily activity patterns. We found that, while whales were active during daytime making energetic lunges to capture tonnes of plankton, they dedicated much of the night to rest. This suggests that whales may rely on vision to find prey...

  18. Sirius brightest diamond in the night sky

    CERN Document Server

    Holberg, Jay B

    2007-01-01

    This book describes why Sirius has been regarded as an important fixture of the night sky since the beginnings of history. It also examines the part that Sirius has played in how we came to achieve our current scientific understanding of stars.

  19. Why Is the Sky Dark at Night?

    Science.gov (United States)

    Stinner, Arthur

    2014-01-01

    The puzzle as to just why the sky is dark at night, given that there are so many stars, has been around at least since Newton. This article summarizes six cosmological models that have been used to attempt to give an account of this puzzle including the Copernican universe, the Newton-Halley universe, the nineteenth century "one galaxy"…

  20. Portable real-time color night vision

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.

    2008-01-01

    We developed a simple and fast lookup-table based method to derive and apply natural daylight colors to multi-band night-time images. The method deploys an optimal color transformation derived from a set of samples taken from a daytime color reference image. The colors in the resulting colorized

  1. Cellular phone use while driving at night.

    Science.gov (United States)

    Vivoda, Jonathon M; Eby, David W; St Louis, Renée M; Kostyniuk, Lidia P

    2008-03-01

    Use of a cellular phone has been shown to negatively affect one's attention to the driving task, leading to an increase in crash risk. At any given daylight hour, about 6% of US drivers are actively talking on a hand-held cell phone. However, previous surveys have focused only on cell phone use during the day. Driving at night has been shown to be a riskier activity than driving during the day. The purpose of the current study was to assess the rate of hand-held cellular phone use while driving at night, using specialized night vision equipment. In 2006, two statewide direct observation survey waves of nighttime cellular phone use were conducted in Indiana utilizing specialized night vision equipment. Combined results of driver hand-held cellular phone use from both waves are presented in this manuscript. The rates of nighttime cell phone use were similar to results found in previous daytime studies. The overall rate of nighttime hand-held cellular phone use was 5.8 +/- 0.6%. Cellular phone use was highest for females and for younger drivers. In fact, the highest rate observed during the study (of 11.9%) was for 16-to 29-year-old females. The high level of cellular phone use found within the young age group, coupled with the increased crash risk associated with cellular phone use, nighttime driving, and for young drivers in general, suggests that this issue may become an important transportation-related concern.

  2. Family Literacy Night: A Celebration of Reading!

    Science.gov (United States)

    Campbell, Becky; Morton, Shirley; Rumschlag, Hella

    2011-01-01

    Family Literacy Night is an exciting way to engage students and their parents in meaningful literacy activities while building community spirit and strengthening the partnership between school and home. It is an opportunity for students to show their parents what they do in school; how they create in the computer lab, how they work in the art…

  3. Science by night – it's magic!

    CERN Document Server

    CERN Bulletin

    2010-01-01

    The control rooms of the LHC and its experiments threw open their doors to 150 youngsters on European Researchers Night and the place was buzzing with excitement all evening!    It's just possible that a few scientists' vocations were born last Friday night, as the sixth European Researchers Night took place across Europe. CERN was taking part for the first time and invited young people aged from 12 to 19 into the control rooms of the LHC machine and five experiments. From 5.00 in the afternoon until 1.00 in the morning, 150 youngsters and physics teachers got the opportunity to sit with scientists at the controls of the accelerator and experiments. This meeting of minds went down very well for all concerned, the scientists being only too happy to wax lyrical about their passion. The youngsters were thrilled with their visit and amazed at being allowed so close to the controls of these mighty machines. The night-time setting added an extra touch of magic to the whole event. Some just could...

  4. Early Birds by Light at Night

    NARCIS (Netherlands)

    Jong, De Maaike; Caro, Samuel P.; Gienapp, Phillip; Spoelstra, Kamiel; Visser, Marcel E.

    2017-01-01

    Artificial light at night disturbs the daily rhythms of many organisms. To what extent this disturbance depends on the intensity and spectral composition of light remain obscure. Here, we measured daily activity patterns of captive blue tits (Cyanistes caeruleus) exposed to similar intensities of

  5. Night Vision Manual for the Flight Surgeon.

    Science.gov (United States)

    1985-08-01

    macula and fovea centralis. 4. Duality theory of vision-extends sensitivity of vision over 100,000 times (Fig. 12). ~Im Uilting Ullmlrage WVIVIWCentral...lowered night vision capa- bilities due to disease or degenerations . F. Hypoxia 1. Decrement of central vision due to 02 lack is quite small; such as, at

  6. Night eating among veterans with obesity.

    Science.gov (United States)

    Dorflinger, Lindsey M; Ruser, Christopher B; Masheb, Robin M

    2017-10-01

    The obesity rate is higher among veterans than the general population, yet few studies have examined their eating behaviors, and none have examined the presence of night eating and related comorbidities. This study examines night eating syndrome (NES) among veterans seeking weight management treatment, and relationships between NES and weight, insomnia, disordered eating, and psychological variables. The sample consisted of 110 veterans referred to a weight management program at VA Connecticut Healthcare System. More than one out of ten veterans screened positive for NES, and one-third screened positive for insomnia. Most individuals screening positive for NES also screened positive for insomnia. Night eating was associated with higher BMI, and with higher scores on measures of binge eating, emotional overeating, and eating disorder symptomatology. Veterans screening positive for NES were also significantly more likely to screen positive for depression and PTSD. When controlling for insomnia, only the relationships between night eating and binge and emotional eating remained significant. Those screening positive for PTSD were more likely to endorse needing to eat to return to sleep. Findings suggest that both NES and insomnia are common among veterans seeking weight management services, and that NES is a marker for additional disordered eating behavior, specifically binge eating and overeating in response to emotions. Additional studies are needed to further delineate the relationships among NES, insomnia, and psychological variables, as well as to examine whether specifically addressing NES within behavioral weight management interventions can improve weight outcomes and problematic eating behaviors. Published by Elsevier Ltd.

  7. Behavioral management of night eating disorders

    Directory of Open Access Journals (Sweden)

    Berner LA

    2013-03-01

    Full Text Available Laura A Berner,1 Kelly C Allison2 1Department of Psychology, Drexel University, 2Department of Psychiatry, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA Abstract: Night eating syndrome (NES is a form of disordered eating associated with evening hyperphagia (overeating at night and nocturnal ingestions (waking at night to eat. As with other forms of disordered eating, cognitive and behavioral treatment modalities may be effective in reducing NES symptoms. This review presents evidence for a variety of behavioral treatment approaches, including behavioral therapy, phototherapy, behavioral weight loss treatment, and cognitive-behavioral therapy. A more detailed overview of cognitive-behavioral therapy for NES is provided. All of these studies have been case studies or included small samples, and all but one have been uncontrolled, but the outcomes of many of these approaches are promising. Larger randomized controlled trials are warranted to advance NES treatment literature. With the inclusion of NES in the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5 as a “Feeding or Eating Disorder Not Elsewhere Classified,” more sophisticated, empirically-supported, behaviorally-based treatment approaches are much needed. Keywords: night eating syndrome, cognitive-behavioral treatment, phototherapy, behavioral weight loss, behavior therapy

  8. Artificial night lighting inhibits feeding in moths

    NARCIS (Netherlands)

    Langevelde, Van Frank; Grunsven, Van Roy H.A.; Veenendaal, Elmar M.; Fijen, Thijs P.M.

    2017-01-01

    One major, yet poorly studied, change in the environment is nocturnal light pollution, which strongly alters habitats of nocturnally active species. Artificial night lighting is often considered as driving force behind rapid moth population declines in severely illuminated countries. To understand

  9. Deliberate introduction of the European rabbit, Oryctolagus cuniculus, into Australia.

    Science.gov (United States)

    Fenner, F

    2010-04-01

    The European rabbit was brought to Australia as a companion animal by early settlers. It sometimes escaped, but failed to survive in the Australian bush. In 1879 wild rabbits were deliberately sent to Victoria to provide game for wealthy settlers to shoot. They soon spread all over Australia, except in the tropics, and became Australia's major animal pest. After careful testing in Australian wildlife and in humans, control by myxoma virus was introduced at various sites between 1937 and 1950, spreading all over the Murray-Darling Basin in 1950. Within one year mutations in the virus had led to slightly less virulence, and these continued for the next 50 years. In the early 21st Century testing viruses obtained from wild rabbits showed that the majority of these viruses were more virulent than the virus used to initiate the epidemic. In 1995 another virus specific for European rabbits, rabbit haemorrhagic disease virus, escaped from areas in which field trials were being carried out and spread around Australia. It was more successful than myxomatosis for rabbit control in arid regions.

  10. Masticatory muscle activity during deliberately performed oral tasks

    International Nuclear Information System (INIS)

    Farella, M; Palla, S; Erni, S; Gallo, L M; Michelotti, A

    2008-01-01

    The aim of this study was to investigate masticatory muscle activity during deliberately performed functional and non-functional oral tasks. Electromyographic (EMG) surface activity was recorded unilaterally from the masseter, anterior temporalis and suprahyoid muscles in 11 subjects (5 men, 6 women; age = 34.6 ± 10.8 years), who were accurately instructed to perform 30 different oral tasks under computer guidance using task markers. Data were analyzed by descriptive statistics, repeated measurements analysis of variance (ANOVA) and hierarchical cluster analysis. The maximum EMG amplitude of the masseter and anterior temporalis muscles was more often found during hard chewing tasks than during maximum clenching tasks. The relative contribution of masseter and anterior temporalis changed across the tasks examined (F ≥ 5.2; p ≤ 0.001). The masseter muscle was significantly (p ≤ 0.05) more active than the anterior temporalis muscle during tasks involving incisal biting, jaw protrusion, laterotrusion and jaw cupping, the difference being statistically significant (p ≤ 0.05). The anterior temporalis muscle was significantly (p ≤ 0.01) more active than the masseter muscle during tasks performed in intercuspal position, during tooth grinding, and during hard chewing on the working side. Based upon the relative contribution of the masseter, anterior temporalis, and suprahyoid muscles, the investigated oral tasks could be grouped into six separate clusters. The findings provided further insight into muscle- and task-specific EMG patterns during functional and non-functional oral behaviors

  11. Hierarchy, Dominance, and Deliberation: Egalitarian Values Require Mental Effort.

    Science.gov (United States)

    Van Berkel, Laura; Crandall, Christian S; Eidelman, Scott; Blanchar, John C

    2015-09-01

    Hierarchy and dominance are ubiquitous. Because social hierarchy is early learned and highly rehearsed, the value of hierarchy enjoys relative ease over competing egalitarian values. In six studies, we interfere with deliberate thinking and measure endorsement of hierarchy and egalitarianism. In Study 1, bar patrons' blood alcohol content was correlated with hierarchy preference. In Study 2, cognitive load increased the authority/hierarchy moral foundation. In Study 3, low-effort thought instructions increased hierarchy endorsement and reduced equality endorsement. In Study 4, ego depletion increased hierarchy endorsement and caused a trend toward reduced equality endorsement. In Study 5, low-effort thought instructions increased endorsement of hierarchical attitudes among those with a sense of low personal power. In Study 6, participants' thinking quickly allocated more resources to high-status groups. Across five operationalizations of impaired deliberative thought, hierarchy endorsement increased and egalitarianism receded. These data suggest hierarchy may persist in part because it has a psychological advantage. © 2015 by the Society for Personality and Social Psychology, Inc.

  12. Deliberate self-harm behavior among young violent offenders.

    Science.gov (United States)

    Laporte, Natalie; Ozolins, Andrejs; Westling, Sofie; Westrin, Åsa; Billstedt, Eva; Hofvander, Björn; Wallinius, Märta

    2017-01-01

    Deliberate self-harm behavior (DSH) can have profound effects on a person's quality of life, and challenges the health care system. Even though DSH has been associated with aggressive interpersonal behaviors, the knowledge on DSH in persons exhibiting such behaviors is scarce. This study aims to (1) specify the prevalence and character of DSH, (2) identify clinical, neurocognitive, psychosocial, and criminological characteristics associated with DSH, and (3) determine predictors of DSH among young violent offenders. Data were collected from a nationally representative cohort of 270 male violent offenders, 18-25 years old, imprisoned in Sweden. Participants were interviewed and investigated neuropsychologically, and their files were reviewed for psychosocial background, criminal history, mental disorders, lifetime aggressive antisocial behaviors, and DSH. A total of 62 offenders (23%) had engaged in DSH at some point during their lifetime, many on repeated occasions, yet without suicidal intent. DSH was significantly associated with attention deficit hyperactivity disorder, mood disorders, anxiety disorders, various substance use disorders, being bullied at school, and repeated exposure to violence at home during childhood. Mood disorders, anxiety disorders, and being bullied at school remained significant predictors of DSH in a total regression model. Violent offenders direct aggressive behaviors not only toward other people, but also toward themselves. Thus, DSH must be assessed and prevented in correctional institutions as early as possible, and more knowledge is needed of the function of DSH among offenders.

  13. Evolution of the ATLAS Nightly Build System

    International Nuclear Information System (INIS)

    Undrus, A

    2012-01-01

    The ATLAS Nightly Build System is a major component in the ATLAS collaborative software organization, validation, and code approval scheme. For over 10 years of development it has evolved into a factory for automatic release production and grid distribution. The 50 multi-platform branches of ATLAS releases provide vast opportunities for testing new packages, verification of patches to existing software, and migration to new platforms and compilers for ATLAS code that currently contains 2200 packages with 4 million C++ and 1.4 million python scripting lines written by about 1000 developers. Recent development was focused on the integration of ATLAS Nightly Build and Installation systems. The nightly releases are distributed and validated and some are transformed into stable releases used for data processing worldwide. The ATLAS Nightly System is managed by the NICOS control tool on a computing farm with 50 powerful multiprocessor nodes. NICOS provides the fully automated framework for the release builds, testing, and creation of distribution kits. The ATN testing framework of the Nightly System runs unit and integration tests in parallel suites, fully utilizing the resources of multi-core machines, and provides the first results even before compilations complete. The NICOS error detection system is based on several techniques and classifies the compilation and test errors according to their severity. It is periodically tuned to place greater emphasis on certain software defects by highlighting the problems on NICOS web pages and sending automatic e-mail notifications to responsible developers. These and other recent developments will be presented and future plans will be described.

  14. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  15. The Long Night of Research, Vienna International Centre (VIC), Vienna, Austria, 22 April 2016

    International Nuclear Information System (INIS)

    Jandrić, Zora; Abrahim, Aiman; Kelly, Simon; Cannavan, Andrew

    2016-01-01

    On 22 April the IAEA, along with other VIC-based organizations, took part in the biannual Long Night of Research (Lange Nacht der Forschung); an Austria-wide event coordinated by several Austrian government ministries that aims to spark interest in science and research. This was the seventh year of the Long Night of Research, and the first time the IAEA was involved. The VIC was one of around 250 exhibit locations across the country. The event gave visitors a chance to learn about the variety of nuclear applications in various fields. The Food and Environmental Protection Laboratory (FEPL) exhibition booth focused on testing for food authenticity, posing the question ‘is your food what you think it is?’. Food is an essential part of our daily lives. We need our food to be safe and we want to know what we are eating. Nuclear and related techniques can be used to control food safety and to fight food fraud – the deliberate mislabelling of food products

  16. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  17. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  18. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  19. Creating informed public opinion: citizen deliberation about nanotechnologies for human enhancements

    International Nuclear Information System (INIS)

    Cobb, Michael D.

    2011-01-01

    Many people believe that ordinary citizens should influence scientific and technological developments, but the American public is routinely uninformed about these issues. As a solution, some scholars advocate creating informed public opinions by encouraging citizens to deliberate about the issues. Although this idea is currently widely applauded in the science and technology literature, deliberative outcomes are infrequently measured and the practice of deliberation is routinely criticized in other disciplines. This research contributes to our understanding of the effectiveness of citizen deliberation as a method for increasing public engagement with science. I report data measuring results of deliberation in a national citizens’ technology forum (NCTF) about nanotechnologies for human enhancement. The NCTF was a month-long process involving six groups of 9–15 ordinary citizens who deliberated in different locations across the United States with the goal of reaching consensus about policy recommendations within their groups. I find that structured deliberation generated informed opinions, sometimes meaningful shifts in preferences, and increased trust and internal efficacy among the participants. Nevertheless, the NCTF has important shortcomings, and it is not obvious that consensus conferences should be preferred over other mechanisms for creating informed opinions. Future research is needed to corroborate the findings of this study and to systematically compare outcomes of structured citizen deliberation to other less resource intensive forms of engagement.

  20. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  4. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  7. Individual decision making, group decision making and deliberation

    Directory of Open Access Journals (Sweden)

    Radovanović Bojana

    2012-01-01

    Full Text Available Each of us makes a number of decisions, from the less important to those with far-reaching consequences. As members of different groups, we are also actors of group decision making. In order to make a rational decision, a choice-making procedure must satisfy a number of assumptions (conditions of rationality. In addition, when it comes to group decisions, those procedures should also be “fair.” However, it is not possible to define a procedure of choice-making that would transform individual orders of alternatives based on preferences of perfectly rational individuals into a single social order and still meet conditions of rationality and ethics. The theory of deliberative democracy appeared in response to the impossibility of Social Choice theory. The basic assumption of deliberative democracy is that individuals adjust their preferences taking into account interests of the community. They are open for discussion with other group members and are willing to change their attitudes in order to achieve common interests. Ideally, group members come to an agreement during public discussion (deliberation. Still, this concept cannot completely over­come all the difficulties posed by the theory of social choice. Specifically, there is no solution for strategic and manipulative behavior of individuals. Also, the concept of deliberative democracy faces certain problems particular to this approach, such as, to name but a few, problems with the establishment of equality of participants in the debate and their motivation, as well as problems with the organization of public hearings. [Projekat Ministarstva nauke Republike Srbije, br. 47009: Evropske integracije i društveno-ekonomske promene privrede Srbije na putu ka EU i br. 179015: Izazovi i perspektive strukturnih promena u Srbiji: Strateški pravci ekonomskog razvoja i usklađivanje sa zahtevima EU

  8. Modeling Inhalational Tularemia: Deliberate Release and Public Health Response

    Science.gov (United States)

    Hall, Ian M.; Leach, Steve

    2011-01-01

    Two epidemic modeling studies of inhalational tularemia were identified in the published literature, both demonstrating the high number of potential casualties that could result from a deliberate aerosolized release of the causative agent in an urban setting. However, neither study analyzed the natural history of inhalational tularemia nor modeled the relative merits of different mitigation strategies. We first analyzed publicly available human/primate experimental data and reports of naturally acquired inhalational tularemia cases to better understand the epidemiology of the disease. We then simulated an aerosolized release of the causative agent, using airborne dispersion modeling to demonstrate the potential number of casualties and the extent of their spatial distribution. Finally, we developed a public health intervention model that compares 2 mitigation strategies: targeting antibiotics at symptomatic individuals with or without mass distribution of antibiotics to potentially infected individuals. An antibiotic stockpile that is sufficient to capture all areas where symptomatic individuals were infected is likely to save more lives than treating symptomatic individuals alone, providing antibiotics can be distributed rapidly and their uptake is high. However, with smaller stockpiles, a strategy of treating symptomatic individuals alone is likely to save many more lives than additional mass distribution of antibiotics to potentially infected individuals. The spatial distribution of symptomatic individuals is unlikely to coincide exactly with the path of the dispersion cloud if such individuals are infected near their work locations but then seek treatment close to their homes. The optimal mitigation strategy will depend critically on the size of the release relative to the stockpile level and the effectiveness of treatment relative to the speed at which antibiotics can be distributed. PMID:22044315

  9. Artificial light at night inhibits mating in a Geometrid moth

    NARCIS (Netherlands)

    van Geffen, Koert G.; van Eck, Emiel; de Boer, Rens A.; van Grunsven, Roy H.A.; Salis, Lucia; Berendse, Frank; Veenendaal, Elmar M.

    2015-01-01

    * Levels of artificial night lighting are increasing rapidly worldwide, subjecting nocturnal organisms to a major change in their environment. Many moth species are strongly attracted to sources of artificial night lighting, with potentially severe, yet poorly studied, consequences for development,

  10. The feast "STAR NIGHT 2009" in Shumen, Bulgaria

    Science.gov (United States)

    Kyurkchieva, Diana P.

    Information about the preparation and realization of the attractive program for the "Star Night" on September 25, 2009, in Shumen, is presented. Its goal is popularization of the European initiative "Research Night" in Bulgaria.

  11. Geneva motorway bypass closed for two nights

    CERN Document Server

    2006-01-01

    The carriageways heading towards France on the airport section of the motorway will be closed from 8.30 p.m. to 5.00 a.m. in the night of 1 to 2 October and those heading towards Lausanne during the same hours in the night of 2 to 3 October. This is to allow dry-surface road-marking and signage work to be performed. The work will be postponed in the event of bad weather, in which case the new date will be announced on Radio RSR and Radio Lac as well as on the telephone traffic news service 163. Diversions will be in operation. Thank you in advance for your understanding. For further information, tel. 163 or www.autoroute-aeroport.ch Civil Engineering Department, DCTI, State of Geneva

  12. Multi-channel automotive night vision system

    Science.gov (United States)

    Lu, Gang; Wang, Li-jun; Zhang, Yi

    2013-09-01

    A four-channel automotive night vision system is designed and developed .It is consist of the four active near-infrared cameras and an Mulit-channel image processing display unit,cameras were placed in the automobile front, left, right and rear of the system .The system uses near-infrared laser light source,the laser light beam is collimated, the light source contains a thermoelectric cooler (TEC),It can be synchronized with the camera focusing, also has an automatic light intensity adjustment, and thus can ensure the image quality. The principle of composition of the system is description in detail,on this basis, beam collimation,the LD driving and LD temperature control of near-infrared laser light source,four-channel image processing display are discussed.The system can be used in driver assistance, car BLIS, car parking assist system and car alarm system in day and night.

  13. The volunteer programme ‘Night Ravens’:

    DEFF Research Database (Denmark)

    Larsen, Britt Østergaard; Kleif, Helle Bendix; Kolodziejczyk, Christophe

    2015-01-01

    The volunteer programme ‘Night Ravens’ (NR) was founded in Sweden in 1987 and has, over the years, developed into a Scandinavian concept covering large areas of Sweden, Denmark, Norway, Greenland and the Faroe Islands. The NR programme is a crime prevention initiative with adults walking...... the streets at night in identifiable ‘uniforms’ in areas with high activity. The purpose of this study is to evaluate the effects of the NR programme in Denmark based on a volunteer set-up with a less intrusive approach to situational crime prevention than, for instance, hot spot policing. The analyses...... are based on a longitudinal data set containing socio-demographic information on all 585 postcode districts in Denmark and quarterly records of six different categories of reported crimes in the years 2001–2010.We apply a difference-in-difference design and compare development in crime rates in districts...

  14. CMS Virtual Visit - Researchers Night in Portugal

    CERN Multimedia

    Abreu, Pedro

    2016-01-01

    Researchers Night at Planetarium Calouste Gulbenkian - Ciência Viva Centre in Lisbon. Organised by researchers from LIP (Laboratório de Instrumentação e Física Experimental de Partículas) and including CMS Virtual Visit during which André David Tinoco Mendes and José Rasteiro da Silva, based at Cessy, France, "virtually" discussed science and technology behind the CMS detector with the audience in Lisbon.

  15. The Mythology of the Night Sky

    Science.gov (United States)

    Falkner, David E.

    The word "planet" comes from the Latin word planeta and the Greek word planes, which means "wanderer." When the ancient Greeks studied the night sky they noticed that most of the stars remained in the same position relative to all the other stars, but a few stars seem to move in the sky from day to day, week to week, and month to month. The Greeks called these rogue stars "wanderers" because they wandered through the starry background.

  16. Influence of climate factors on emergency visits for childhood asthma attack.

    Science.gov (United States)

    Hashimoto, Mitsuo; Fukuda, Taiki; Shimizu, Tetsuya; Watanabe, Shou; Watanuki, Satoshi; Eto, Yoshikatsu; Urashima, Mitsuyoshi

    2004-02-01

    Asthma attack shows strong seasonality. The purpose of the present study was to quantify the contribution of climate variables and other seasonal factors on the incidence of emergency visits for childhood asthma in Tokyo, Japan. The number of children who visited emergency rooms at Jikei university hospitals in Tokyo during 1998-2002 (5559 visits) was retrieved retrospectively from files from the Department of Pediatrics, and compared with 45 climate parameters from the Meteorological Agency using multiple regression models with a stepwise backward elimination approach. The number of visits (3.7 +/- 3.1) per night increased significantly when climate conditions showed a rapid decrease from higher barometric pressure, from higher air temperature and from higher humidity, as well as lower wind speed. The best-fit model demonstrated that a 22% variation in the number of visits was explained by a linear relationship with 12 climate variables, which increased to 36% after adjusting for calendar month and day of the week. Moreover, when the number of asthma visits was cut off at nine per night, the area under the receiver operator characteristics curve was 0.91 (95% CI: 0.89-0.94) in the multiple logistic regression model using the same variables. These results suggest that these models might quantify contributions of specific climate conditions and other seasonal factors on the number of emergency visits per night for childhood asthma attack in Tokyo, Japan.

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  19. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  20. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  1. Dry eye signs and symptoms in night-time workers

    OpenAIRE

    Ali Makateb; Hamed Torabifard

    2017-01-01

    Purpose: To determine the effect of night-time working on dry eye signs and symptoms. Methods: A total of 50 healthy subjects completed a dry eye questionnaire and underwent clinical examinations including basic Schirmer's test and tear breakup time (TBUT) test on two consecutive days, before and after the night shift (12-hrs night-shift). Results: All dry eye symptoms were aggravated significantly after the night shift (P 

  2. Is global warming mostly at night?

    International Nuclear Information System (INIS)

    Kukla, G.; Quayle, R.G.; Karl, T.

    1994-01-01

    The release of greenhouse gases is expected to lead to substantial future warming. The global mean temperature has indeed risen in recent decades. The causes of the observed warming, and its relation to the greenhouse gas buildup are, however, still debated. One important aspect of the observed temperature change relates to its asymmetry during the day and night. The day-night temperature difference over land in North America, most of Eurasia, Oceania, and portions of Africa and Australia shows a decrease since about 1950. The changes of the daily mean temperature in these areas are principally due to the rising night or early morning temperature, and are accompanied by increasing cloudiness. Their results support the notion that the increase of cloud cover, possibly due to industrial sulfur emissions, mitigates the greenhouse warming. The causes of the changing diurnal temperature range and of the increasing cloudiness will have to be clarified and the future SO 2 emissions reliably projected before any trustworthy prediction of future climates can be made. 37 refs., 7 figs., 2 tabs

  3. Agomelatine Efficacy in the Night Eating Syndrome

    Directory of Open Access Journals (Sweden)

    Walter Milano

    2013-01-01

    Full Text Available Night eating syndrome (NES is a nosographic entity included among the forms not otherwise specified (EDNOS in eating disorders (ED of the DSM IV. It is characterized by a reduced food intake during the day, evening hyperphagia, and nocturnal awakenings associated with conscious episodes of compulsive ingestion of food. Frequently, NES patients show significant psychopathology comorbidity with affective disorders. This paper describes a case report of an NES patient treated with agomelatine, an antidepressant analogue of melatonin, which acts by improving not only the mood but also by regulating sleep cycles and appetite. After three months of observation, the use of Agomelatine not only improved the mood of our NES patient (assessed in the HAM-D scores but it was also able to reduce the night eating questionnaire, by both reducing the number of nocturnal awakenings with food intake, the time of snoring, the minutes of movement during night sleep (assessed at polysomnography, and the weight (−5.5 kg and optimizing blood glucose and lipid profile. In our clinical case report, agomelatine was able both to reduce the NES symptoms and to significantly improve the mood of our NES patient without adverse side effects during the duration of treatment. Therefore, our case report supports the rationale for further studies on the use of Agomelatine in the NES treatment.

  4. Mothers' night work and children's behavior problems.

    Science.gov (United States)

    Dunifon, Rachel; Kalil, Ariel; Crosby, Danielle A; Su, Jessica Houston

    2013-10-01

    Many mothers work in jobs with nonstandard schedules (i.e., schedules that involve work outside of the traditional 9-5, Monday through Friday schedule); this is particularly true for economically disadvantaged mothers. In the present article, we used longitudinal data from the Fragile Families and Child Wellbeing Survey (n = 2,367 mothers of children ages 3-5 years) to examine the associations between maternal nonstandard work and children's behavior problems, with a particular focus on mothers' night shift work. We employed 3 analytic strategies with various approaches to adjusting for observed and unobserved selection factors; these approaches provided an upper and lower bound on the true relationship between night shift work and children's behavior. Taken together, the results provide suggestive evidence for modest associations between exposure to maternal night shift work and higher levels of aggressive and anxious or depressed behavior in children compared with children whose mothers who are not working, those whose mothers work other types of nonstandard shifts, and, for aggressive behavior, those whose mothers work standard shifts.

  5. Persepsi Wisatawan Terhadap Night Life Attraction

    Directory of Open Access Journals (Sweden)

    Hary Hermawan

    2017-04-01

    ABSTRACT Cabaret is a term performances of music, comedy, dance, drama, and other special mix of art perfomed by men who dressed in women (ladyboy on stage. Cabaret performances in Oyot Godhong Restaurant intended as new tourist attraction that is expected to increase the interest of tourists to visit Malioboro in Yogyakarta, especially to Oyot Godhong Restaurants. Based descriptive study shows that the characteristics travelers who viewed Kabaret show is very diverse, each of which has perceptions and motivations are different. Cabaret performances have qualified to become the cultural attractions are staged at night (night atraction in the city of Yogyakarta. Based on traveler perception indicates that the cabaret performances have beauty or aesthetics, uniqueness, and values that match the criteria criteria of the standard as a tourist attraction. Performances Cabaret in Oyot Godhong Restaurants able to increase the sale value. Oyot Godhong Restaurants previously only form of tourism facilities (amenities, but is now a restaurant that has a tourist attraction (atraction.   Keywords: Cabaret show, night life attractions, tourism attraction, tourists perception, tourism marketing

  6. Day and night grazing by cattle in the Sahel

    NARCIS (Netherlands)

    Ayantunde, A.A.; Fernandez-Rivera, S.; Hiernaux, P.H.; Keulen, van H.; Udo, H.M.J.

    2002-01-01

    The influence of night grazing on feeding behavior, nutrition and performance of cattle was studied. Twenty-four steers weighing 367 kg (SD = 76) grazed either from 0900 to 1900 (day grazers), 2100 to 0700 (night grazers) or 0900 to 1900 and 2400 to 0400 (day-and-night grazers) during 13 weeks. Four

  7. 5 CFR 532.505 - Night shift differentials.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Night shift differentials. 532.505... PREVAILING RATE SYSTEMS Premium Pay and Differentials § 532.505 Night shift differentials. (a) Employees shall be entitled to receive night shift differentials in accordance with section 5343 of title 5...

  8. A Decision Support Framework For Science-Based, Multi-Stakeholder Deliberation: A Coral Reef Example

    Science.gov (United States)

    We present a decision support framework for science-based assessment and multi-stakeholder deliberation. The framework consists of two parts: a DPSIR (Drivers-Pressures-States-Impacts-Responses) analysis to identify the important causal relationships among anthropogenic environ...

  9. Managers' views on and experiences with moral case deliberation in nursing teams

    NARCIS (Netherlands)

    Weidema, F.C.; Molewijk, A.C.; Kamsteeg, F.; Widdershoven, G.A.M.

    2015-01-01

    Aims: Providing management insights regarding moral case deliberation (MCD) from the experiential perspective of nursing managers. Background: MCD concerns systematic group-wise reflection on ethical issues. Attention to implementing MCD in health care is increasing, and managers' experiences

  10. Don't just do something, stand there! The value and art of deliberate clinical inertia.

    Science.gov (United States)

    Keijzers, Gerben; Cullen, Louise; Egerton-Warburton, Diana; Fatovich, Daniel M

    2018-04-01

    It can be difficult to avoid unnecessary investigations and treatments, which are a form of low-value care. Yet every intervention in medicine has potential harms, which may outweigh the potential benefits. Deliberate clinical inertia is the art of doing nothing as a positive response. This paper provides suggestions on how to incorporate deliberate clinical inertia into our daily clinical practice, and gives an overview of current initiatives such as 'Choosing Wisely' and the 'Right Care Alliance'. The decision to 'do nothing' can be complex due to competing factors, and barriers to implementation are highlighted. Several strategies to promote deliberate clinical inertia are outlined, with an emphasis on shared decision-making. Preventing medical harm must become one of the pillars of modern health care and the art of not intervening, that is, deliberate clinical inertia, can be a novel patient-centred quality indicator to promote harm reduction. © 2018 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  11. Beyond Reactive Planning: Self Adaptive Software and Self Modeling Software in Predictive Deliberation Management

    National Research Council Canada - National Science Library

    Lenahan, Jack; Nash, Michael P; Charles, Phil

    2008-01-01

    .... We present the following hypothesis: predictive deliberation management using self-adapting and self-modeling software will be required to provide mission planning adjustments after the start of a mission...

  12. Deliberate practice and performance in music, games, sports, education, and professions: a meta-analysis.

    Science.gov (United States)

    Macnamara, Brooke N; Hambrick, David Z; Oswald, Frederick L

    2014-08-01

    More than 20 years ago, researchers proposed that individual differences in performance in such domains as music, sports, and games largely reflect individual differences in amount of deliberate practice, which was defined as engagement in structured activities created specifically to improve performance in a domain. This view is a frequent topic of popular-science writing-but is it supported by empirical evidence? To answer this question, we conducted a meta-analysis covering all major domains in which deliberate practice has been investigated. We found that deliberate practice explained 26% of the variance in performance for games, 21% for music, 18% for sports, 4% for education, and less than 1% for professions. We conclude that deliberate practice is important, but not as important as has been argued. © The Author(s) 2014.

  13. It's not all about moral reasoning: Understanding the content of Moral Case Deliberation.

    Science.gov (United States)

    Svantesson, Mia; Silén, Marit; James, Inger

    2018-03-01

    Moral Case Deliberation is one form of clinical ethics support described as a facilitator-led collective moral reasoning by healthcare professionals on a concrete moral question connected to their practice. Evaluation research is needed, but, as human interaction is difficult to standardise, there is a need to capture the content beyond moral reasoning. This allows for a better understanding of Moral Case Deliberation, which may contribute to further development of valid outcome criteria and stimulate the normative discussion of what Moral Case Deliberation should contain. To explore and compare the content beyond moral reasoning in the dialogue in Moral Case Deliberation at Swedish workplaces. A mixed-methods approach was applied for analysing audio-recordings of 70 periodic Moral Case Deliberation meetings at 10 Swedish workplaces. Moral Case Deliberation facilitators and various healthcare professions participated, with registered nurses comprising the majority. Ethical considerations: No objection to the study was made by an Ethical Review Board. After oral and written information was provided, consent to be recorded was assumed by virtue of participation. Other than 'moral reasoning' (median (md): 45% of the spoken time), the Moral Case Deliberations consisted of 'reflections on the psychosocial work environment' to a varying extent (md: 29%). Additional content comprised 'assumptions about the patient's psychosocial situation' (md: 6%), 'facts about the patient's situation' (md: 5%), 'concrete problem-solving' (md: 6%) and 'process' (md: 3%). The findings suggest that a restorative function of staff's wellbeing in Moral Case Deliberation is needed, as this might contribute to good patient care. This supports outcome criteria of improved emotional support, which may include relief of moral distress. However, facilitators need a strategy for how to proceed from the participants' own emotional needs and to develop the use of their emotional knowing to focus on

  14. Aristotle on Deliberation:Its Place in Ethics, Politics and Rhetoric

    OpenAIRE

    Kock, Christian Erik J

    2014-01-01

    Aristotle differs from most later philosophers in distinguishing clearly between epistemic reasoning, which aims for truth, and practical reasoning, which does not. How can he posit this distinction and yet not dismiss practical reasoning as flattery and manipulation, as Plato did? The answer lies in the concepts of deliberation (boulē, bouleusis) and deliberate choice (proairesis). They link Aristotle's rhetoric, ethics, and politics together and help provide definitions of all three: Ethics...

  15. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  16. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  17. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  18. [Moral case deliberation: time for ethical reflection in the daily practice of mental health care].

    Science.gov (United States)

    Vellinga, A; van Melle-Baaijens, E A H

    2016-01-01

    Nowadays, reflecting on ethics, which we choose to call moral case deliberation, is occurring more and more frequently in psychiatric institutions. We have personal experience of organising and supervising moral case deliberation in a large psychiatric institute and we can confirm the positive effects of moral case deliberation which have been reported in the literature. To describe a structured method for moral case deliberation which enables care-givers in health care and/or addiction care to reflect on moral dilemmas. We refer to the main findings in relevant literature and describe how we developed a structured method for implementing moral case deliberation. Our studies of the literature indicate that systematic reflection about ethical dilemmas can improve the quality of care and make care-givers more satisfied with their work. This is why we have developed our own method which is applicable particularly to psychiatric and/or addition care and which can be used systematically in discussions of moral dilemmas. Our method for discussing ethical issues works well in clinical practice, particularly when it is embedded in a multidisciplinary context. Of course, to ensure the continuity of the system, deliberation about moral and ethical issues needs to be financially safeguarded and embedded in the organisation. Discussion of moral issues improves the quality of care and increases care-givers' satisfaction with their work.

  19. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  20. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  1. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  2. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  3. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  4. The city at night (the case of Maribor, Slovenia

    Directory of Open Access Journals (Sweden)

    Vladimir Drozg

    2016-12-01

    Full Text Available This paper focuses on the city at night. The distinctive aspect of the discussed topic is the time dimension of spaces and areas – places that “live” at night. The night has economic, cultural, social and formal elements; and it is these elements that underpin how we see and come to know the city at night. A range of topics have been explored: places of retailing and consumption, workplaces, places of entertainment, places that embody the night image of the city and places of socially unacceptable, delinquent behaviour. In the empirical part, we examined the city of Maribor, Slovenia.

  5. The night sky brightness at McDonald Observatory

    Science.gov (United States)

    Kalinowski, J. K.; Roosen, R. G.; Brandt, J. C.

    1975-01-01

    Baseline observations of the night sky brightness in B and V are presented for McDonald Observatory. In agreement with earlier work by Elvey and Rudnick (1937) and Elvey (1943), significant night-to-night and same-night variations in sky brightness are found. Possible causes for these variations are discussed. The largest variation in sky brightness found during a single night is approximately a factor of two, a value which corresponds to a factor-of-four variation in airglow brightness. The data are used to comment on the accuracy of previously published surface photometry of M 81.

  6. Night Work and the Risk of Depression.

    Science.gov (United States)

    Angerer, Peter; Schmook, Renate; Elfantel, Irina; Li, Jian

    2017-07-16

    Working the night shift interferes with the circadian chronobiological rhythm, causing sleep disturbances, fatigue, and diminished wellbeing, and increases the risk of serious disease. The question whether night work increases the risk of depression has not been adequately studied to date. We carried out a systematic, broadly conceived literature search in the PubMed, Scopus, PsycINFO, and PSYNDEX databases and the Medpilot search portal on the topic of nighttime shift work and mental illness. The search yielded 5682 hits, which were narrowed down by predefined selection criteria to 11 high-quality longitudinal studies on the relationship between nighttime shift work and depressive illness. Only these 11 studies were subjected to further analysis. 3 of 4 studies on nighttime shift work in the health professions (almost exclusively nursing) revealed no association with depression over an observation period of two years. On the other hand, 5 studies on nighttime shift work in occupations outside the health sector, with observation periods of two or more years, yielded evidence of an elevated risk of depression after several years of nighttime shift work, but not in any uniform pattern. A supplementary meta-analysis of 5 of the studies revealed a 42% increase of the risk of depression among persons working the night shift (95% confidence interval [0.92; 2.19]). Psychosocial working conditions that have a negative influence on health partially account for these associations. Although there is evidence that nighttime shift work (at least, in occupations outside the health sector) does increase the risk of depression, this evidence is not strong enough to sustain a general medical recommendation against shift work for employees with depressive conditions. It would seem appropriate to address this question on an individual basis, with strong support from physicians and close attention to the deleterious psychosocial factors associated with shift work.

  7. The stargazer's guide to the night sky

    CERN Document Server

    Lisle, Jason, Dr

    2012-01-01

    Explore the night sky, identify stars, constellations, and even planets. Stargaze with a telescope, binoculars, or even your naked eye. Allow Dr. Jason Lisle, a research scientist with a masters and PhD in astrophysics, to guide you in examining the beauty of God's Creation with 150 full color star-charts. Learn the best ways and optimal times to observe planets and stars with easy to use illustrations. Create or expand the hobby of stargazing; an outdoor, educational hobby to enjoy with friends or family.

  8. Domiciliary night nursing service: luxury or necessity?

    OpenAIRE

    Martin, M H; Ishino, M

    1981-01-01

    The nursing records of the 242 patients who used the domiciliary night nursing care service in Newham Health District showed that three distinct groups of patients were nursed during 1979 at a cost of 8.8 pounds a day. Forty-three elderly chronically sick and five disabled patients aged under 50 received care for more than 28 days, 63 patients had terminal cancer, and 131 needed short-term care or observation. Data were also collected from a one-day survey of patients receiving care. This dom...

  9. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  10. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  11. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  12. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  13. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  14. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  15. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  16. Lacanian Reading of Marsha Norman's Night, Mother

    Directory of Open Access Journals (Sweden)

    Khadijeh Taherifard

    2017-05-01

    Full Text Available This paper offers a Lacanian/feminist reading of Night, Mother by the American playwright Marsha Norman. The play Night, Mother will be read according to Lacan’s point of view and the concepts of identity and identity formation are studied in this paper. The play will be analyzed based on the Lacanian concepts of the contrast between the Imaginary Order and the Symbolic Order, and the notion of Death Drive, suggesting that in the play Jessie represents the Symbolic Order and her mother, Thelma, represents the Imaginary Order. The notion of Death Drive and its omnipresence in Jessie’s psyche is discussed and emphasized. Thelma functions as the Other for Jessie, while her father functions as the Mother, a reversal of gender roles in the Lacanian reading. Moreover, the relationship between some of the concepts are explained. It will be explicated how the play can be brought in line with a feminist reading of Lacan by reversing the stereotypical gender roles and subsequently getting close to post-feminist authors.

  17. Night sleep in patients with vegetative state.

    Science.gov (United States)

    Pavlov, Yuri G; Gais, Steffen; Müller, Friedemann; Schönauer, Monika; Schäpers, Barbara; Born, Jan; Kotchoubey, Boris

    2017-10-01

    Polysomnographic recording of night sleep was carried out in 15 patients with the diagnosis vegetative state (syn. unresponsive wakefulness syndrome). Sleep scoring was performed by three raters, and confirmed by means of a spectral power analysis of the electroencephalogram, electrooculogram and electromyogram. All patients but one exhibited at least some signs of sleep. In particular, sleep stage N1 was found in 13 patients, N2 in 14 patients, N3 in nine patients, and rapid eye movement sleep in 10 patients. Three patients exhibited all phenomena characteristic for normal sleep, including spindles and rapid eye movements. However, in all but one patient, sleep patterns were severely disturbed as compared with normative data. All patients had frequent and long periods of wakefulness during the night. In some apparent rapid eye movement sleep episodes, no eye movements were recorded. Sleep spindles were detected in five patients only, and their density was very low. We conclude that the majority of vegetative state patients retain some important circadian changes. Further studies are necessary to disentangle multiple factors potentially affecting sleep pattern of vegetative state patients. © 2017 European Sleep Research Society.

  18. Being a researcher for one night

    CERN Multimedia

    Roberto Cantoni

    2010-01-01

    On 24 September from 5 p.m. to 1 a.m., European Researchers Night will give some 100 young students from local schools the opportunity to sit side by side with scientists and operators in the LHC control rooms. At the same time, a live webcast will connect CERN with various institutes around Europe participating in the Being a European Scientist Today (BEST) project. You are all invited to take part!   Copyright Frascati Scienza The European Researchers Night is an EU initiated and funded initiative, which aims at highlighting the appeal of being a researcher. Meeting scientists in a ‘fun’ and festive context gives the public, especially the young, the opportunity to get to know the job better and be inspired to pursue a career in research. “CERN scientists already took part in last year’s event, but only through a web connection with Frascati in Italy”, explains Paola Catapano, a member of the Communication group and organiser of the activities t...

  19. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  2. Improvement of Hungarian Joint Terminal Attack Program

    Science.gov (United States)

    2013-06-13

    LST Laser Spot Tracker NVG Night Vision Goggle ROMAD Radio Operator Maintainer and Driver ROVER Remotely Operated Video Enhanced Receiver TACP...visual target designation. The other component consists of a laser spot tracker (LST), which identifies targets by tracking laser energy reflecting...capability for every type of night time missions, laser spot tracker for laser spot search missions, remotely operated video enhanced receiver

  3. The role of deliberate practice in the acquisition of clinical skills

    Directory of Open Access Journals (Sweden)

    Duvivier Robbert J

    2011-12-01

    Full Text Available Abstract Background The role of deliberate practice in medical students' development from novice to expert was examined for preclinical skill training. Methods Students in years 1-3 completed 34 Likert type items, adapted from a questionnaire about the use of deliberate practice in cognitive learning. Exploratory factor analysis and reliability analysis were used to validate the questionnaire. Analysis of variance examined differences between years and regression analysis the relationship between deliberate practice and skill test results. Results 875 students participated (90%. Factor analysis yielded four factors: planning, concentration/dedication, repetition/revision, study style/self reflection. Student scores on 'Planning' increased over time, score on sub-scale 'repetition/revision' decreased. Student results on the clinical skill test correlated positively with scores on subscales 'planning' and 'concentration/dedication' in years 1 and 3, and with scores on subscale 'repetition/revision' in year 1. Conclusions The positive effects on test results suggest that the role of deliberate practice in medical education merits further study. The cross-sectional design is a limitation, the large representative sample a strength of the study. The vanishing effect of repetition/revision may be attributable to inadequate feedback. Deliberate practice advocates sustained practice to address weaknesses, identified by (self-assessment and stimulated by feedback. Further studies should use a longitudinal prospective design and extend the scope to expertise development during residency and beyond.

  4. Ethical case deliberation on the ward. A comparison of four methods.

    Science.gov (United States)

    Steinkamp, Norbert; Gordijn, Bert

    2003-01-01

    The objective of this article is to analyse and compare four methods of ethical case deliberation. These include Clinical Pragmatism, The Nijmegen Method of ethical case deliberation, Hermeneutic dialogue, and Socratic dialogue. The origin of each method will be briefly sketched. Furthermore, the methods as well as the related protocols will be presented. Each method will then be evaluated against the background of those situations in which it is being used. The article aims to show that there is not one ideal method of ethical case deliberation, which fits to all possible kinds of moral problems. Rather, as each of the methods highlights a limited number of morally relevant aspects, each method has its strengths and weaknesses as well. These strengths and weaknesses should be evaluated in relation to different types of situations, for instance moral problems in treatment decisions, moral uneasiness and residue, and the like. The suggestion arrived at on the basis of the findings of this paper is a reasonable methodological plurality. This means that a method can be chosen depending on the type of moral problem to be deliberated upon. At the same time it means, that by means of a method, deliberation should be facilitated.

  5. Arsia Mons by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 22 June 2004 This pair of images shows part of Arsia Mons. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -19.6, Longitude 241.9 East (118.1 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  6. Albor Tholus by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 21 June 2004 This pair of images shows part of Albor Tholus. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude 17.6, Longitude 150.3 East (209.7 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  7. Noctus Labyrinthus by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 25 June 2004 This pair of images shows part of Noctus Labyrinthus. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -9.6, Longitude 264.5 East (95.5 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with

  8. Crater Ejecta by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 24 June 2004 This pair of images shows a crater and its ejecta. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -9, Longitude 164.2 East (195.8 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  9. Meridiani Crater in Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 14 June 2004 This pair of images shows crater ejecta in the Terra Meridiani region. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -1.6, Longitude 4.1 East (355.9 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in

  10. Ius Chasma by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 18 June 2004 This pair of images shows part of Ius Chasma. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -1, Longitude 276 East (84 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project policies at

  11. Gusev Crater by Day and Night

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 23 June 2004 This pair of images shows part of Gusev Crater. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude -14.5, Longitude 175.5 East (184.5 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project

  12. Day And Night In Terra Meridiani

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 11 June 2004 This pair of images shows part of the Terra Meridiani region. Day/Night Infrared Pairs The image pairs presented focus on a single surface feature as seen in both the daytime and nighttime by the infrared THEMIS camera. The nighttime image (right) has been rotated 180 degrees to place north at the top. Infrared image interpretation Daytime: Infrared images taken during the daytime exhibit both the morphological and thermophysical properties of the surface of Mars. Morphologic details are visible due to the effect of sun-facing slopes receiving more energy than antisun-facing slopes. This creates a warm (bright) slope and cool (dark) slope appearance that mimics the light and shadows of a visible wavelength image. Thermophysical properties are seen in that dust heats up more quickly than rocks. Thus dusty areas are bright and rocky areas are dark. Nighttime: Infrared images taken during the nighttime exhibit only the thermophysical properties of the surface of Mars. The effect of sun-facing versus non-sun-facing energy dissipates quickly at night. Thermophysical effects dominate as different surfaces cool at different rates through the nighttime hours. Rocks cool slowly, and are therefore relatively bright at night (remember that rocks are dark during the day). Dust and other fine grained materials cool very quickly and are dark in nighttime infrared images. Image information: IR instrument. Latitude 1.3, Longitude 0.5 East (359.5 West). 100 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with

  13. Conscious thought beats deliberation without attention in diagnostic decision-making: at least when you are an expert.

    Science.gov (United States)

    Mamede, Sílvia; Schmidt, Henk G; Rikers, Remy M J P; Custers, Eugene J F M; Splinter, Ted A W; van Saase, Jan L C M

    2010-11-01

    Contrary to what common sense makes us believe, deliberation without attention has recently been suggested to produce better decisions in complex situations than deliberation with attention. Based on differences between cognitive processes of experts and novices, we hypothesized that experts make in fact better decisions after consciously thinking about complex problems whereas novices may benefit from deliberation-without-attention. These hypotheses were confirmed in a study among doctors and medical students. They diagnosed complex and routine problems under three conditions, an immediate-decision condition and two delayed conditions: conscious thought and deliberation-without-attention. Doctors did better with conscious deliberation when problems were complex, whereas reasoning mode did not matter in simple problems. In contrast, deliberation-without-attention improved novices' decisions, but only in simple problems. Experts benefit from consciously thinking about complex problems; for novices thinking does not help in those cases.

  14. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  15. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  16. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  17. The observer's year 366 nights in the universe

    CERN Document Server

    Moore, Patrick

    2005-01-01

    This is a night by night account of the stars. For every night of the year Sir Patrick Moore gives the reader details of interesting objects that can be seen from earth. It is a book for people with a wide interest in astronomy, those who may not have specialised in a specific area of astronomy and wish to expand their knowledge in all areas. This second edition is updated for astronomical events through until 2010.

  18. Childhood night terrors and sleepwalking: diagnosis and treatment

    OpenAIRE

    Sachin Ratan Gedam; Pradeep S. Patil; Imran Ali Shivji

    2017-01-01

    Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to...

  19. Increased and Mistimed Sex Hormone Production in Night Shift Workers

    OpenAIRE

    Papantoniou, K; Pozo, OJ; Espinosa, A; Marcos, J; Castano-Vinyals, G; Basagana, X; Juanola Pages, E; Mirabent, J; Martin, J; Such Faro, P; Gasco Aparici, A; Middleton, B; Skene, DJ; Kogevinas, M

    2015-01-01

    BACKGROUND: Night shift work has been associated with an increased risk for breast and prostate cancer. The effect of circadian disruption on sex steroid production is a possible underlying mechanism, underinvestigated in humans. We have assessed daily rhythms of sex hormones and melatonin in night and day shift workers of both sexes. METHODS: We recruited 75 night and 42 day workers, ages 22 to 64 years, in different working settings. Participants collected urine samples from all voids over ...

  20. 'What the hell is water?' How to use deliberate clinical inertia in common emergency department situations.

    Science.gov (United States)

    Egerton-Warburton, Diana; Cullen, Louise; Keijzers, Gerben; Fatovich, Daniel M

    2018-06-01

    Appropriate deliberate clinical inertia refers to the art of doing nothing as a positive clinical response. It includes shared decision-making to improve patient care with the use of clinical judgement. We discuss common clinical scenarios where the use of deliberate clinical inertia can occur. The insertion of peripheral intravenous cannulae, investigating patients with suspected renal colic and the investigation of low risk chest pain are all opportunities for the thoughtful clinician to 'stand there' and use effective patient communication to avoid low value tests and procedures. Awareness is key to identifying these opportunities to practice deliberate clinical inertia, as many of the situations may be so much a part of our environment that they are hidden in plain view. © 2018 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  1. Deliberation at the hub of medical education: beyond virtue ethics and codes of practice.

    Science.gov (United States)

    Barilan, Y M; Brusa, M

    2013-02-01

    Although both codes of practice and virtue ethics are integral to the ethos and history of "medical professionalism", the two trends appear mutually incompatible. Hence, in the first part of the paper we explore and explicate this apparent conflict and seek a direction for medical education. The theoretical and empirical literature indicates that moral deliberation may transcend the incompatibilities between the formal and the virtuous, may enhance moral and other aspects of personal sensitivity, may help design and improve other parts of the curricula, and may foster self-awareness and clarification of the professional role. Not only are these goals essential for good and conscientious doctoring, but they may also reduce physicians' "burn-out". We argue that medical education should focus on the ubiquitous practice of deliberation in contemporary medicine, and especially the practice of moral deliberation.

  2. Researchers' Night: science at the shops

    CERN Multimedia

    Corinne Pralavorio

    2015-01-01

    On 25 September, as part of European Researchers’ Night, CERN and POPScience joined forces to welcome the public at the Balexert shopping centre in Geneva. The Bulletin presents its gallery of photographs from the exciting and educational event.   Science through comic strips, games, cinema and television: POPScience approaches scientific questions through popular culture, with great success! Around 500 children attended the sessions for schools at Balexert's multiplex cinema, and 600 spectators flocked to the public screenings.  Using the big screen, scientists, directors and authors were on hand to disentangle truth from untruths and science from science fiction. The guests, some of whom appeared in person and others via video link, included Jorge Cham, author of PhD Comics and the spin-off film; David Saltzberg, physicist at CMS and scientific consultant for the television series The Big Bang Theory; Kip Thorne, scientific consultant for the film Interstellar; Lawrence ...

  3. STARS4ALL Night Sky Brightness Photometer

    Directory of Open Access Journals (Sweden)

    Jaime Zamorano

    2017-06-01

    Full Text Available We present the main features of TESS-W, the first version of a series of inexpensive but reliable photometers that will be used to measure night sky brightness. The bandpass is extended to the red with respect of that of the Sky Quality Meter (SQM. TESS-W connects to a router via WIFI and it sends automatically the brightness values to a data repository using Internet of Things protocols. The device includes an infrared sensor to estimate the cloud coverage. It is designed for fixed stations to monitor the evolution of the sky brightness. The photometer could also be used in local mode connected to a computer or tablet to gather data from a moving vehicle. The photometer is being developed within STARS4ALL project, a collective awareness platform for promoting dark skies in Europe, funded by the EU. We intend to extend the existing professional networks to a citizen-based network of photometers. 

  4. Night lights and regional income inequality in Africa

    DEFF Research Database (Denmark)

    Mveyange, Anthony Francis

    Estimating regional income inequality in Africa has been challenging due to the lack of reliable and consistent sub-national income data. I employ night lights data to circumvent this limitation. I find significant and positive associations between regional inequality visible through night lights...... and income in Africa. Thus, in the absence of income data, we can construct regional inequality proxies using night lights data. Further investigation on the night lights-based regional inequality trends reveals two main findings: first, increasing regional inequality trends between 1992 and 2003; and second......, declining regional inequality trends between 2004 and 2012....

  5. Sign of the day-night asymmetry for solar neutrinos

    International Nuclear Information System (INIS)

    Chiang, Cheng-Wei; Wolfenstein, Lincoln

    2001-01-01

    A qualitative understanding of the day-night asymmetry for solar neutrinos is provided. The greater night flux in ν e is seen to be a consequence of the fact that the matter effect in the Sun and that in the Earth have the same sign. It is shown in the adiabatic approximation for the Sun and constant density for the Earth that, for all values of the mixing angle θ V between 0 and π/2, the night flux of neutrinos is greater than the day flux. Only for small values of θ V where the adiabatic approximation badly fails does the sign of the day-night asymmetry reverse

  6. Dim Light at Night Increases Body Mass of Female Mice

    OpenAIRE

    Aubrecht, Taryn G.; Jenkins, Richelle; Nelson, Randy J.

    2014-01-01

    During the past century the prevalence of light at night has increased in parallel with obesity rates. Dim light at night (dLAN) increases body mass in male mice. However, the effects of light at night on female body mass remain unspecified. Thus, female mice were exposed to a standard light/dark (LD; 16h light at ~150 lux/8h dark at ~0 lux) cycle or to light/dim light at night (dLAN; 16h light at ~150 lux/8h dim light at ~5 lux) cycles for six weeks. Females exposed to dLAN increased the rat...

  7. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  8. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  9. Association between PM2.5 and primary care visits due to asthma attack in Japan: relation to Beijing's air pollution episode in January 2013.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2014-03-01

    In January 2013, extremely high concentrations of fine particles (PM2.5) were observed around Beijing, China. In Japan, the health effects of transboundary air pollution have been a matter of concern. We examined the association between the levels of outdoor PM2.5 and other air pollutants with primary care visits (PCVs) at night due to asthma attack in Himeji City, western Japan. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan, involving 112 subjects aged 0-80 years who visited the clinic due to an asthma attack between 9 p.m. and 6 a.m. during the period January-March, 2013. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and some meteorological elements were measured, and a conditional logistic regression model was used to estimate the odds ratios (OR) of PCVs per unit increment in air pollutants or meteorological elements. Of the 112 subjects, 76 (68 %) were aged asthma attack at night. A positive relation between ozone and PCVs due to asthma attack was detected. The OR per 10 ppb increment in daily mean ozone the day before the visit was 2.31 (95 % confidence interval 1.16-4.61). These findings do not support an association between daily mean concentration of PM2.5 and PCVs at night. However, we did find evidence suggesting that ozone is associated with PCVs.

  10. Deliberate practice predicts performance over time in adolescent chess players and drop-outs: a linear mixed models analysis.

    Science.gov (United States)

    de Bruin, Anique B H; Smits, Niels; Rikers, Remy M J P; Schmidt, Henk G

    2008-11-01

    In this study, the longitudinal relation between deliberate practice and performance in chess was examined using a linear mixed models analysis. The practice activities and performance ratings of young elite chess players, who were either in, or had dropped out of the Dutch national chess training, were analysed since they had started playing chess seriously. The results revealed that deliberate practice (i.e. serious chess study alone and serious chess play) strongly contributed to chess performance. The influence of deliberate practice was not only observable in current performance, but also over chess players' careers. Moreover, although the drop-outs' chess ratings developed more slowly over time, both the persistent and drop-out chess players benefited to the same extent from investments in deliberate practice. Finally, the effect of gender on chess performance proved to be much smaller than the effect of deliberate practice. This study provides longitudinal support for the monotonic benefits assumption of deliberate practice, by showing that over chess players' careers, deliberate practice has a significant effect on performance, and to the same extent for chess players of different ultimate performance levels. The results of this study are not in line with critique raised against the deliberate practice theory that the factors deliberate practice and talent could be confounded.

  11. Night and day in the VA: associations between night shift staffing, nurse workforce characteristics, and length of stay.

    Science.gov (United States)

    de Cordova, Pamela B; Phibbs, Ciaran S; Schmitt, Susan K; Stone, Patricia W

    2014-04-01

    In hospitals, nurses provide patient care around the clock, but the impact of night staff characteristics on patient outcomes is not well understood. The aim of this study was to examine the association between night nurse staffing and workforce characteristics and the length of stay (LOS) in 138 veterans affairs (VA) hospitals using panel data from 2002 through 2006. Staffing in hours per patient day was higher during the day than at night. The day nurse workforce had more educational preparation than the night workforce. Nurses' years of experience at the unit, facility, and VA level were greater at night. In multivariable analyses controlling for confounding variables, higher night staffing and a higher skill mix were associated with reduced LOS. © 2014 Wiley Periodicals, Inc.

  12. Place and Situated Deliberation in Participatory Planning – A Research Proposal

    DEFF Research Database (Denmark)

    Korn, Matthias

    2011-01-01

    for everyone and everywhere through a mobile augmented reality application that visualizes future, planned buildings on capable mobile phones. I conclude with the central questions and problems for future research that focuses on place and situated deliberation.......Within the domain of participatory urban planning, this position paper argues for a focus on the notion of place in the design of mobile and/or ubiquitous systems that are used in deliberation processes with central spatial references. I discuss (1) leveraging properties of place as a resource...

  13. Governance networks as a frame for inter-demoi participation and deliberation

    DEFF Research Database (Denmark)

    Sørensen, Eva

    2012-01-01

    By focusing exclusively on the contributions of political participation and deliberation to the enhancement of democratic regulation within a unitary democratic unit-that is, a demos-traditional liberal theories of democracy overlook the democratic value of political participation and deliberation...... between demoi. The need to find ways to increase the democratic quality of inter-demoi interaction is growing rapidly due to the emergence of a pluricentric political system in which cross-demoi decision-making is more the rule than the exception. There is an urgent call for new theories of democracy able...

  14. Research opportunities in simulation-based medical education using deliberate practice.

    Science.gov (United States)

    McGaghie, William C

    2008-11-01

    There are many opportunities for the academic emergency medicine (EM) community to engage in simulation-based educational research using deliberate practice (DP). This article begins by defining and giving examples of two key concepts: deliberate practice and mastery learning. The article proceeds to report six lessons learned from a research legacy in simulation-based medical education (SBME). It concludes by listing and amplifying 10 DP research opportunities in academic EM. A coda states that the research agenda is rich and ambitious and should focus on the goal of educating superb, expert clinicians.

  15. Light at Night Markup Language (LANML): XML Technology for Light at Night Monitoring Data

    Science.gov (United States)

    Craine, B. L.; Craine, E. R.; Craine, E. M.; Crawford, D. L.

    2013-05-01

    Light at Night Markup Language (LANML) is a standard, based upon XML, useful in acquiring, validating, transporting, archiving and analyzing multi-dimensional light at night (LAN) datasets of any size. The LANML standard can accommodate a variety of measurement scenarios including single spot measures, static time-series, web based monitoring networks, mobile measurements, and airborne measurements. LANML is human-readable, machine-readable, and does not require a dedicated parser. In addition LANML is flexible; ensuring future extensions of the format will remain backward compatible with analysis software. The XML technology is at the heart of communicating over the internet and can be equally useful at the desktop level, making this standard particularly attractive for web based applications, educational outreach and efficient collaboration between research groups.

  16. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  17. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  18. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  19. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  20. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  1. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  2. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  3. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  4. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  5. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. Relationship between thyroid stimulating hormone and night shift work.

    Science.gov (United States)

    Moon, So-Hyun; Lee, Bum-Joon; Kim, Seong-Jin; Kim, Hwan-Cheol

    2016-01-01

    Night shift work has well-known adverse effects on health. However, few studies have investigated the relationship between thyroid diseases and night shift work. This study aimed to examine night shift workers and their changes in thyroid stimulating hormones (TSH) levels over time. Medical check-up data (2011-2015) were obtained from 967 female workers at a university hospital in Incheon, Korea. Data regarding TSH levels were extracted from the records, and 2015 was used as a reference point to determine night shift work status. The relationships between TSH levels and night shift work in each year were analyzed using the general linear model (GLM). The generalized estimating equation (GEE) was used to evaluate the repeated measurements over the 5-year period. The GEE analysis revealed that from 2011 to 2015, night shift workers had TSH levels that were 0.303 mIU/L higher than the levels of non-night shift workers (95 % CI: 0.087-0.519 mIU/L, p  = 0.006) after adjusting for age and department. When we used TSH levels of 4.5 ≥ mIU/L to identify subclinical hypothyroidism, night shift workers exhibited a 1.399 fold higher risk of subclinical hypothyroidism (95 % CI: 1.050-1.863, p  = 0.022), compared to their non-night shift counterparts. This result of this study suggests that night shift workers may have an increased risk of thyroid diseases, compared to non-night shift workers.

  7. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  8. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  9. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  10. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  11. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  12. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  13. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  16. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  17. Gender Roles and Night-Sky Watching among College Students

    Science.gov (United States)

    Kelly, William E.; McGee, Catherine M.

    2012-01-01

    The present study investigated the relationship between gender roles and night-sky watching in a sample of college students (N=161). The Bem Sex-Role Inventory (BSRI) and the Noctcaelador Inventory (NI) were used to investigate the differences between gender role groups for night-sky watching. The results supported the hypothesis that androgynous…

  18. Heart rate variability changes in physicians working on night call.

    Science.gov (United States)

    Malmberg, Birgitta; Persson, Roger; Flisberg, Per; Ørbaek, Palle

    2011-03-01

    Adverse effects by night-call duty have become an important occupational health issue. The aim of this study was to investigate whether the heart rate variability (HRV) differed during recovery from day work and night-call duty between distinct physician specialities. We studied the impact of a 16-h night-call duty on autonomic balance, measured by HRV, among two physician groups differing with respect to having to deal with life-threatening conditions while on call. Nineteen anaesthesiologists (ANEST) and 16 paediatricians and ear, nose and throat surgeons (PENT) were monitored by ambulatory digital Holter electrocardiogram (ECG). Heart rate variability was analysed between 21:00 and 22:00 after an ordinary workday, on night call and in the evening post-call. Absolute and normalized high-frequency power (HF, HFnu) were the main outcome variables, expressing parasympathetic influence on the heart. ANEST had lower HF power than PENT while on night call and post-daytime work (p work compared with post-night-call duty (p balance and did not differ between specialities. However, the less dynamic HRV after daytime work and during night-call duty in the ANEST group may indicate a higher physiological stress level. These results may contribute to the improvement of night-call schedules within the health care sector.

  19. Deliverance from the "Dark Night of the Soul"

    Science.gov (United States)

    Kinnier, Richard T.; Dixon, Andrea L.; Scheidegger, Corey; Lindberg, Brent

    2009-01-01

    For many individuals, spiritual inspiration, clarity, or epiphany is often preceded by a "dark night of the soul". St. John of the Cross, a Spanish mystic of the 16th century, first described the concept. Today, the phrase "dark night of the soul" is usually associated with the crisis part of the journey to enlightenment. This article defines and…

  20. 46 CFR 9.5 - Night, Sunday, and holiday defined.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Night, Sunday, and holiday defined. 9.5 Section 9.5... COMPENSATION FOR OVERTIME SERVICES § 9.5 Night, Sunday, and holiday defined. (a) For the purpose of this part... term holiday shall mean only national legal public holidays, viz., January 1, February 22, May 30, July...

  1. 78 FR 19742 - Centennial Challenges: 2014 Night Rover Challenge

    Science.gov (United States)

    2013-04-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-032] Centennial Challenges: 2014 Night... Centennial Challenges 2014 Night Rover Challenge. SUMMARY: This notice is issued in accordance with 51 U.S.C.... Centennial Challenges is a program of prize competitions to stimulate innovation in technologies of interest...

  2. Artificial light at night inhibits mating in a Geometrid moth

    NARCIS (Netherlands)

    Geffen, van K.G.; Eck, van E.; Boer, de R.; Grunsven, van R.H.A.; Salis, F.; Berendse, F.; Veenendaal, E.M.

    2015-01-01

    1.Levels of artificial night lighting are increasing rapidly worldwide, subjecting nocturnal organisms to a major change in their environment. Many moth species are strongly attracted to sources of artificial night lighting, with potentially severe, yet poorly studied, consequences for development,

  3. Do wild great tits avoid exposure to light at night?

    NARCIS (Netherlands)

    De Jong, M.; Ouyang, Jenny; van Grunsven, Roy H. A.; Visser, M.E.; Spoelstra, K.

    2016-01-01

    Studies of wild populations have provided important insights into the effects of artificial light at night on organisms, populations and ecosystems. However, in most studies the exact amount of light at night individuals are exposed to remains unknown. Individuals can potentially control their

  4. Do wild great tits avoid exposure to light at night?

    NARCIS (Netherlands)

    Jong, De Maaike; Ouyang, Jenny Q.; Grunsven, van Roy H.A.; Visser, Marcel E.; Spoelstra, Kamiel

    2016-01-01

    Studies of wild populations have provided important insights into the effects of artificial light at night on organisms, populations and ecosystems. However, in most studies the exact amount of light at night individuals are exposed to remains unknown. Individuals can potentially control their

  5. INVIS : Integrated night vision surveillance and observation system

    NARCIS (Netherlands)

    Toet, A.; Hogervorst, M.A.; Dijk, J.; Son, R. van

    2010-01-01

    We present the design and first field trial results of the all-day all-weather INVIS Integrated Night Vision surveillance and observation System. The INVIS augments a dynamic three-band false-color nightvision image with synthetic 3D imagery in a real-time display. The night vision sensor suite

  6. Psyche and Society in Sendak's "In the Night Kitchen"

    Science.gov (United States)

    Adams, Rebecca V. L.; Rabkin, Eric S.

    2007-01-01

    While "Where the Wild Things Are" may be Maurice Sendak's most popular book, "In the Night Kitchen" is arguably the greater work. Though his journey in "Wild Things" shares many of the elements of Mickey's adventure in "Night Kitchen"--swinging between the protagonist's initiatory verbal assertions and silent, completely pictorial spreads that…

  7. 'Irrigation by night' in the Eastern Cape, South Africa

    African Journals Online (AJOL)

    2017-01-01

    Jan 1, 2017 ... tions in irrigation systems in the night: 'It is common place that the night is the time ..... roads and rainwater tanks ('JoJo's') to water the gardens. The ..... drainage system throughout the home garden, but also directly from the ...

  8. Nonelective surgery at night and in-hospital mortality

    DEFF Research Database (Denmark)

    van Zaane, Bas; van Klei, Wilton A; Buhre, Wolfgang F

    2015-01-01

    BACKGROUND: Evidence suggests that sleep deprivation associated with night-time working may adversely affect performance resulting in a reduction in the safety of surgery and anaesthesia. OBJECTIVE: Our primary objective was to evaluate an association between nonelective night-time surgery and in...

  9. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  10. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  11. Prevalence and characteristics of moral case deliberation in Dutch health care

    NARCIS (Netherlands)

    Dauwerse, L.; Stolper, M.M.; Widdershoven, G.; Molewijk, A.C.

    2014-01-01

    The attention for Moral case deliberation (MCD) has increased over the past years. Previous research on MCD is often written from the perspective of MCD experts or MCD participants and we lack a more distant view to the role of MCD in Dutch health care institutions in general. The purpose of this

  12. The Use of Expressives in Online Political Talk : Impeding or Facilitating the Normative Goals of Deliberation?

    NARCIS (Netherlands)

    Graham, T.S.; Tambouris, E; Macintosh, A; Glassey, O

    2010-01-01

    Net-based public sphere researchers have questioned whether the internet presents the public sphere with a new opportunity for the development of public spaces where free, equal and open deliberation among citizens can flourish. However, much of the research has operationalized a formal notion of

  13. Personal Characteristics of Teachers, Situational Variables and Deliberations in Planning Instruction.

    Science.gov (United States)

    Kremer, Lya

    This study reveals possible relationships among teachers' personality traits, situational variables, and deliberation characteristics in planning instruction. Dogmatism and locus of control perceptions were the personality traits studied, and the situations compared student teachers with elementary and secondary school teachers. Both groups were…

  14. The Cognitive-Miser Response Model: Testing for Intuitive and Deliberate Reasoning

    Science.gov (United States)

    Bockenholt, Ulf

    2012-01-01

    In a number of psychological studies, answers to reasoning vignettes have been shown to result from both intuitive and deliberate response processes. This paper utilizes a psychometric model to separate these two response tendencies. An experimental application shows that the proposed model facilitates the analysis of dual-process item responses…

  15. Developing Emotionally Intelligent Leadership: The Need for Deliberate Practice and Collaboration across Disciplines

    Science.gov (United States)

    Allen, Scott J.; Shankman, Marcy Levy; Haber-Curran, Paige

    2016-01-01

    This chapter continues the discussion of what leadership education is and highlights the importance of emotionally intelligent leadership. The authors assert the need for deliberate practice and better collaboration between student affairs, academic affairs, and academic departments to develop emotionally intelligent leaders.

  16. Research Evidence and School Board Deliberations: Lessons from Three Wisconsin School Districts

    Science.gov (United States)

    Asen, Robert; Gurke, Deb; Conners, Pamela; Solomon, Ryan; Gumm, Elsa

    2013-01-01

    This article analyzes the use of research evidence in school-board deliberations in three school districts in Wisconsin. In these settings, the circulation, meaning, and function of research depended importantly on the interests and backgrounds of advocates, the composition of audiences, and the values and contexts of decision-making. Board…

  17. Ethnic density and deliberate self harm; a small area study in south east London

    NARCIS (Netherlands)

    Neeleman, J; Wilson-Jones, C; Wessely, S

    Study objective-Relative risks are frequently used to convey how strongly outcomes like mental illness and suicidal behaviour are associated with personal characteristics Like ethnic background. This study examined whether RRs for deliberate self harm (DSH) in ethnic groups vary between small areas

  18. Truth in politics : rhetorical approaches to democratic deliberation in Africa and beyond

    NARCIS (Netherlands)

    Salazar, P.J.; Osha, S.; Binsbergen, van W.M.J.

    2004-01-01

    Democracy is about competing "truths". This is why "rhetoric"- the study of public deliberation and the training in public debate and argumentation - is part of democracy in development. This volume acclimatizes "rhetoric" to the philosophical scene in South Africa, and more in general in Africa as

  19. The influence of deliberate practice on musical achievement: A meta-analysis

    Directory of Open Access Journals (Sweden)

    Friedrich ePlatz

    2014-06-01

    Full Text Available Deliberate practice (DP is a task-specific structured training activity that plays a key role in understanding skill acquisition and explaining individual differences in expert performance. Relevant activities that qualify as DP have to be identified in every domain. For example, for training in classical music, solitary practice is a typical training activity during skill acquisition. To date, no meta-analysis on the quantifiable effect size of deliberate practice on attained performance in music has been conducted. Yet the identification of a quantifiable effect size could be relevant for the current discussion on the role of various factors on individual difference in musical achievement. Furthermore, a research synthesis might enable new computational approaches to musical development. Here we present the first meta-analysis on the role of deliberate practice in the domain of musical performance. A final sample size of 13 studies (total N = 788 was carefully extracted to satisfy the following criteria: reported durations of task-specific accumulated practice as predictor variables and objectively assessed musical achievement as the target variable. We identified an aggregated effect size of rc = .61; 95% CI [.54, .67] for the relationship between task-relevant practice (which by definition includes DP and musical achievement. Our results corroborate the central role of long-term (deliberate practice for explaining expert performance in music.

  20. Clinical Diagnostic and Sociocultural Dimensions of Deliberate Self-Harm in Mumbai, India

    Science.gov (United States)

    Parkar, Shubhangi R.; Dawani, Varsha; Weiss, Mitchell G.

    2006-01-01

    Patients' accounts complement psychiatric assessment of deliberate self-harm (DSH). In this study we examined psychiatric disorders, and sociocultural and cross-cultural features of DSH. SCID diagnostic interviews and a locally adapted EMIC interview were used to study 196 patients after DSH at a general hospital in Mumbai, India. Major depression…

  1. The prevalence of self-reported deliberate self harm in Irish adolescents.

    LENUS (Irish Health Repository)

    Morey, Carolyn

    2008-01-01

    BACKGROUND: Deliberate self harm is major public health problem, in particular among young people. Although several studies have addressed the prevalence of deliberate self harm among young people in the community, little is known about the extent to which deliberate self harm comes to the attention of medical services, the self harm methods used and the underlying motives. The aim of this study was to determine the prevalence of deliberate self harm in adolescents and the methods, motives and help seeking behaviour associated with this behaviour. METHODS: A cross-sectional survey using an anonymous self-report questionnaire was administered in 39 schools in the Southern area of the Health Service Executive, Ireland. Of the 4,583 adolescents aged 15-17 years who were invited to participate in the survey, 3,881 adolescents took part (response: 85%). RESULTS: A lifetime history of DSH was reported by 9.1% (n = 333) of the adolescents. DSH was more common among females (13.9%) than males (4.3%). Self cutting (66.0%) and overdose (35.2%) were the most common DSH methods. A minority of participants accessed medical services after engaging in DSH (15.3%). CONCLUSION: DSH is a significant problem in Irish adolescents and the vast majority do not come to the attention of health services. Innovative solutions for prevention and intervention are required to tackle DSH in adolescents.

  2. Problem solving ability and repetition of deliberate self-harm: a multicentre study.

    NARCIS (Netherlands)

    McAuliffe, C.; Corcoran, P.; Keeley, H.S.; Arensman, E.; Bille Brahe, U.; de Leio, D.; Fekete, S.; Hawton, K.; Hjelmeland, H.; Kelleher, M.; Kerkhof, A.J.F.M.; Lonnqvist, J.; Michel, K.; Salander Renberg, E.; Schmidtke, A.; van Heeringen, K.; Wasserman, D.

    2006-01-01

    Background. While recent studies have found problem-solving impairments in individuals who engage in deliberate self-harm (DSH), few studies have examined repeaters and non-repeaters separately. The aim of the present study was to investigate whether specific types of problem-solving are associated

  3. Parental Choices and Ethical Dilemmas Involving Disabilities: Special Education and the Problem of Deliberately Chosen Disabilities

    Science.gov (United States)

    Kauffman, James M.; Hallahan, Daniel P.

    2009-01-01

    Ethical issues regarding children with disabilities have long involved their treatment after they are born. These issues remain important, but children may be deliberately created with or without characteristics that are usually thought of as disabilities. Preimplantation genetic diagnosis (PGD) and related technologies that involve human…

  4. Suicide attempts by deliberate self-poisoning in children and adolescents

    Czech Academy of Sciences Publication Activity Database

    Zakharov, S.; Navrátil, Tomáš; Pelclová, D.

    2013-01-01

    Roč. 210, č. 1 (2013), s. 302-307 ISSN 0165-1781 Institutional support: RVO:61388955 Keywords : Deliberate suicidal self-poisoning * Suicide attempts in children and adolescents * Czech Toxicological Information Centre Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 2.682, year: 2013

  5. Immigration, Suicidal Ideation and Deliberate Self-Injury in the Boston Youth Survey 2006

    Science.gov (United States)

    Borges, Guilherme; Azrael, Deborah; Almeida, Joanna; Johnson, Renee M.; Molnar, Beth E.; Hemenway, David; Miller, Matthew

    2011-01-01

    The prevalence and immigration-related correlates of deliberate self-injury (DSI) and suicidal ideation (SI) were estimated in a sample of Boston public high school students in 2006. Compared with U.S.-born youth, immigrant youth were not at increased risk for DSI or SI, even if they had experienced discrimination due to their ancestry. By…

  6. Adolescent Deliberate Self-Harm: Linkages to Emotion Regulation and Family Emotional Climate

    Science.gov (United States)

    Sim, Leslie; Adrian, Molly; Zeman, Janice; Cassano, Michael; Friedrich, William N.

    2009-01-01

    Parents' responses to their children's emotional expressivity have been shown to significantly influence children's subsequent psychosocial functioning. This study hypothesized that adolescents' deliberate self-harm (DSH) may be an outcome associated with poor emotion regulation as well as an invalidating family environment. The mediational role…

  7. Competencies in nursing students for organized forms of clinical moral deliberation and decision-making

    NARCIS (Netherlands)

    dr. Bart Cusveller; Jeanette den Uil-Westerlaken

    2014-01-01

    Bachelor-prepared nurses are expected to be competent in moral deliberation and decision-making (MDD) in clinical practice. It is unclear, however, how this competence develops in nursing students. This study explores the development of nursing students’ competence for participating in organized

  8. Training healthcare professionals as moral case deliberation facilitators : evaluation of a Dutch training programme

    NARCIS (Netherlands)

    Plantinga, Mirjam; Molewijk, Bert; de Bree, Menno; Moraal, Marloes; Verkerk, Marian; Widdershoven, Guy A. M.

    2012-01-01

    Until recently, moral case deliberation (MCD) sessions have mostly been facilitated by external experts, mainly professional ethicists. We have developed a train the facilitator programme for healthcare professionals aimed at providing them with the competences needed for being an MCD facilitator.

  9. Training healthcare professionals as moral case deliberation facilitators: evaluation of a Dutch training programme

    NARCIS (Netherlands)

    Plantinga, M.; Molewijk, A.C.; de Bree, M.; Moraal, M.; Verkerk, M.; Widdershoven, G.A.

    2012-01-01

    Until recently, moral case deliberation (MCD) sessions have mostly been facilitated by external experts, mainly professional ethicists. We have developed a train the facilitator programme for healthcare professionals aimed at providing them with the competences needed for being an MCD facilitator.

  10. Cognitive Functions of the Cerebellum Explain How Ericsson's Deliberate Practice Produces Giftedness

    Science.gov (United States)

    Vandervert, Larry R.

    2007-01-01

    A critical issue for Ericsson et al.'s proposal is the development of a fully adequate description of neurophysiological substrates for deliberate practice. Ericsson et al. do provide two substantial subsections on biological substrates--namely, their subsections, "Acquisition of superior power, control, and speed of motor activities" and…

  11. Sophistic Ethics in the Technical Writing Classroom: Teaching "Nomos," Deliberation, and Action.

    Science.gov (United States)

    Scott, J. Blake

    1995-01-01

    Claims that teaching ethics is particularly important to technical writing. Outlines a classical, sophistic approach to ethics based on the theories and pedagogies of Protagoras, Gorgias, and Isocrates, which emphasizes the Greek concept of "nomos," internal and external deliberation, and responsible action. Discusses problems and…

  12. Enacting Ethics: Bottom-up Involvement in Implementing Moral Case Deliberation

    NARCIS (Netherlands)

    Weidema, F.C.; Molewijk, A.C.; Widdershoven, G.A.M.; Abma, T.A.

    2012-01-01

    In moral case deliberation (MCD), healthcare professionals meet to reflect upon their moral questions supported by a structured conversation method and non-directive conversation facilitator. An increasing number of Dutch healthcare institutions work with MCD to (1) deal with moral questions, (2)

  13. The influence of deliberate practice on musical achievement: a meta-analysis.

    Science.gov (United States)

    Platz, Friedrich; Kopiez, Reinhard; Lehmann, Andreas C; Wolf, Anna

    2014-01-01

    Deliberate practice (DP) is a task-specific structured training activity that plays a key role in understanding skill acquisition and explaining individual differences in expert performance. Relevant activities that qualify as DP have to be identified in every domain. For example, for training in classical music, solitary practice is a typical training activity during skill acquisition. To date, no meta-analysis on the quantifiable effect size of deliberate practice on attained performance in music has been conducted. Yet the identification of a quantifiable effect size could be relevant for the current discussion on the role of various factors on individual difference in musical achievement. Furthermore, a research synthesis might enable new computational approaches to musical development. Here we present the first meta-analysis on the role of deliberate practice in the domain of musical performance. A final sample size of 13 studies (total N = 788) was carefully extracted to satisfy the following criteria: reported durations of task-specific accumulated practice as predictor variables and objectively assessed musical achievement as the target variable. We identified an aggregated effect size of r c = 0.61; 95% CI [0.54, 0.67] for the relationship between task-relevant practice (which by definition includes DP) and musical achievement. Our results corroborate the central role of long-term (deliberate) practice for explaining expert performance in music.

  14. MENSTRUAL PHASE OF WOMEN AND DEATH DUE TO DELIBERATE SELF HARM: AN AUTOPSY STUDY

    OpenAIRE

    Sujith Sreenivas

    2015-01-01

    The study was conducted by determining the phase of menstruation of women, who committed suicide by subjecting the uterus for gross and histopathological examination. An understanding whether there was an increased incidence of deliberate self - harm during any particular phase of menstruation was made by this study. AIMS: Determination of me...

  15. Non-conscious vs. deliberate dynamic decision-making—a pilot experiment

    NARCIS (Netherlands)

    Grössler, A.; Rouwette, E.A.J.A.; Vennix, J.A.M.; Größler, A.

    2016-01-01

    The purpose of this paper is to explore the effects of non-conscious vs. deliberate ways of making decisions in a dynamic decision-making task. An experimental setting is used to study this question; three experimental groups are distinguished: immediate decision-making (only very limited time for

  16. Applying What Works: A Case for Deliberate Psychological Education in Undergraduate Business Ethics

    Science.gov (United States)

    Schmidt, Christopher Drees; Davidson, Kathleen M.; Adkins, Christopher

    2013-01-01

    The teaching of business ethics continues to be a topic of great concern as both businesses and business schools seek to develop effective approaches for fostering ethical behavior. Responses to this objective have been varied, and consistent empirical evidence for a particular approach has not emerged. One approach, deliberate psychological…

  17. Motives and Suicide Intent Underlying Hospital Treated Deliberate Self-Harm and Their Association with Repetition

    Science.gov (United States)

    McAuliffe, Carmel; Arensman, Ella; Keeley, Helen S.; Corcoran, Paul; Fitzgerald, Anthony P.

    2007-01-01

    The association between motives for deliberate self-harm (DSH), level of suicide intent, and history of DSH is poorly understood. As part of the WHO/EURO Multicentre Study on Suicidal Behavior, the Suicide Intent Scale, and the Motives for Parasuicide Questionnaire were administered to 146 patients presenting with DSH in the Cork region in…

  18. Deliberate self-harm before psychiatric admission and risk of suicide

    DEFF Research Database (Denmark)

    Madsen, Trine; Agerbo, Esben; Mortensen, Preben Bo

    2013-01-01

    Psychiatric illness and deliberate self-harm (DSH) are major risk factors of suicide. In largely 15 % of psychiatric admissions in Denmark, the patient had an episode of DSH within the last year before admission. This study examined the survival and predictors of suicide in a suicidal high...

  19. Assessing the associations among trait and state levels of deliberate and spontaneous mind wandering.

    Science.gov (United States)

    Seli, Paul; Risko, Evan F; Smilek, Daniel

    2016-04-01

    Recent research has demonstrated that mind wandering can be subdivided into spontaneous and deliberate types, and this distinction has been found to hold at both the trait and state levels. However, to date, no attempts have been made to link trait-level spontaneous and deliberate mind wandering with state-level assessments of these two subtypes of mind wandering. Here we evaluated whether trait-level deliberate and spontaneous mind wandering map onto state levels of these subtypes of mind wandering. Results showed correspondence between trait-level reports of spontaneous and deliberate mind wandering and their state-level counterparts, indicating that people's reports on the intentionality of their mind wandering in the laboratory correspond to their reports of the intentionality of mind wandering in everyday life. Thus, the trait- and state-level scales of mind wandering were found to validate each other: Whereas the state-level measures provided some construct validity for the trait-level measures, the trait-level measures indicated that the state-level measures may be generalizable to everyday situations. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Cognitive and Contextual Correlates of Spontaneous and Deliberate Mind-Wandering

    Science.gov (United States)

    Robison, Matthew K.; Unsworth, Nash

    2018-01-01

    Individuals with greater cognitive abilities generally show reduced rates of mind-wandering when completing relatively demanding tasks (Randall, Oswald, & Beier, 2014). However, it is yet unclear whether elevated rates of mind-wandering among low-ability individuals are manifestations of deliberate, intentional episodes of mind-wandering…

  1. Doctor coach: a deliberate practice approach to teaching and learning clinical skills.

    Science.gov (United States)

    Gifford, Kimberly A; Fall, Leslie H

    2014-02-01

    The rapidly evolving medical education landscape requires restructuring the approach to teaching and learning across the continuum of medical education. The deliberate practice strategies used to coach learners in disciplines beyond medicine can also be used to train medical learners. However, these deliberate practice strategies are not explicitly taught in most medical schools or residencies. The authors designed the Doctor Coach framework and competencies in 2007-2008 to serve as the foundation for new faculty development and resident-as-teacher programs. In addition to teaching deliberate practice strategies, the programs model a deliberate practice approach that promotes the continuous integration of newly developed coaching competencies by participants into their daily teaching practice. Early evaluation demonstrated the feasibility and efficacy of implementing the Doctor Coach framework across the continuum of medical education. Additionally, the Doctor Coach framework has been disseminated through national workshops, which have resulted in additional institutions applying the framework and competencies to develop their own coaching programs. Design of a multisource evaluation tool based on the coaching competencies will enable more rigorous study of the Doctor Coach framework and training programs and provide a richer feedback mechanism for participants. The framework will also facilitate the faculty development needed to implement the milestones and entrustable professional activities in medical education.

  2. Psychometric properties of the Dutch version of the Attitude Towards Deliberate Self-Harm Questionnaire

    NARCIS (Netherlands)

    Kool, N.; van Meijel, B.; van der Bijl, J.; Koekkoek, B.; Kerkhof, A.

    2015-01-01

    The attitude of nurses and treatment staff is crucial in the treatment of patients who self-harm. However, many patients experience that attitude as negative. The aim of this study was to investigate the psychometric properties of the Dutch version of the Attitude Towards Deliberate Self-Harm

  3. Schizophrenia and Deliberate Self-Harm: A Systematic Review of Risk Factors

    Science.gov (United States)

    Haw, Camilla; Hawton, Keith; Sutton, Lesley; Sinclair, Julia; Deeks, Jonathan

    2005-01-01

    Deliberate self-harm (DSH) is a strong predictor of suicide in schizophrenia. The aim of this review was to identify risk factors for DSH in schizophrenia. This systematic review of the international literature examined cohort and case-control studies of patients with schizophrenia or related diagnoses that reported DSH as an outcome. Studies were…

  4. Learning by doing. Training health care professionals to become facilitator of moral case deliberation

    NARCIS (Netherlands)

    Stolper, M.M.; Molewijk, A.C.; Widdershoven, G.

    2015-01-01

    Moral case deliberation (MCD) is a dialogue among health care professionals about moral issues in practice. A trained facilitator moderates the dialogue, using a conversation method. Often, the facilitator is an ethicist. However, because of the growing interest in MCD and the need to connect MCD to

  5. Teaching ethics in the clinic. The theory and practice of moral case deliberation.

    Science.gov (United States)

    Molewijk, A C; Abma, T; Stolper, M; Widdershoven, G

    2008-02-01

    A traditional approach to teaching medical ethics aims to provide knowledge about ethics. This is in line with an epistemological view on ethics in which moral expertise is assumed to be located in theoretical knowledge and not in the moral experience of healthcare professionals. The aim of this paper is to present an alternative, contextual approach to teaching ethics, which is grounded in a pragmatic-hermeneutical and dialogical ethics. This approach is called moral case deliberation. Within moral case deliberation, healthcare professionals bring in their actual moral questions during a structured dialogue. The ethicist facilitates the learning process by using various conversation methods in order to find answers to the case and to develop moral competencies. The case deliberations are not unique events, but are a structural part of the professional training on the work floor within healthcare institutions. This article presents the underlying theory on (teaching) ethics and illustrates this approach with an example of a moral case deliberation project in a Dutch psychiatric hospital. The project was evaluated using the method of responsive evaluation. This method provided us with rich information about the implementation process and effects the research process itself also lent support to the process of implementation.

  6. Simulation-Based Mastery Learning with Deliberate Practice Improves Clinical Performance in Spinal Anesthesia

    Directory of Open Access Journals (Sweden)

    Ankeet D. Udani

    2014-01-01

    Full Text Available Introduction. Properly performing a subarachnoid block (SAB is a competency expected of anesthesiology residents. We aimed to determine if adding simulation-based deliberate practice to a base curriculum improved performance of a SAB. Methods. 21 anesthesia residents were enrolled. After baseline assessment of SAB on a task-trainer, all residents participated in a base curriculum. Residents were then randomized so that half received additional deliberate practice including repetition and expert-guided, real-time feedback. All residents were then retested for technique. SABs on all residents’ next three patients were evaluated in the operating room (OR. Results. Before completing the base curriculum, the control group completed 81% of a 16-item performance checklist on the task-trainer and this increased to 91% after finishing the base curriculum (P<0.02. The intervention group also increased the percentage of checklist tasks properly completed from 73% to 98%, which was a greater increase than observed in the control group (P<0.03. The OR time required to perform SAB was not different between groups. Conclusions. The base curriculum significantly improved resident SAB performance. Deliberate practice training added a significant, independent, incremental benefit. The clinical impact of the deliberate practice intervention in the OR on patient care is unclear.

  7. Simulation-based mastery learning with deliberate practice improves clinical performance in spinal anesthesia.

    Science.gov (United States)

    Udani, Ankeet D; Macario, Alex; Nandagopal, Kiruthiga; Tanaka, Maria A; Tanaka, Pedro P

    2014-01-01

    Introduction. Properly performing a subarachnoid block (SAB) is a competency expected of anesthesiology residents. We aimed to determine if adding simulation-based deliberate practice to a base curriculum improved performance of a SAB. Methods. 21 anesthesia residents were enrolled. After baseline assessment of SAB on a task-trainer, all residents participated in a base curriculum. Residents were then randomized so that half received additional deliberate practice including repetition and expert-guided, real-time feedback. All residents were then retested for technique. SABs on all residents' next three patients were evaluated in the operating room (OR). Results. Before completing the base curriculum, the control group completed 81% of a 16-item performance checklist on the task-trainer and this increased to 91% after finishing the base curriculum (P < 0.02). The intervention group also increased the percentage of checklist tasks properly completed from 73% to 98%, which was a greater increase than observed in the control group (P < 0.03). The OR time required to perform SAB was not different between groups. Conclusions. The base curriculum significantly improved resident SAB performance. Deliberate practice training added a significant, independent, incremental benefit. The clinical impact of the deliberate practice intervention in the OR on patient care is unclear.

  8. European public deliberation on brain machine interface technology: five convergence seminars.

    Science.gov (United States)

    Jebari, Karim; Hansson, Sven-Ove

    2013-09-01

    We present a novel procedure to engage the public in ethical deliberations on the potential impacts of brain machine interface technology. We call this procedure a convergence seminar, a form of scenario-based group discussion that is founded on the idea of hypothetical retrospection. The theoretical background of this procedure and the results of five seminars are presented.

  9. Deliberate Science, Continuum Magazine: Clean Energy Innovation at NREL, Winter 2012 (Book)

    Energy Technology Data Exchange (ETDEWEB)

    2012-02-01

    This quarterly magazine is dedicated to stepping beyond the technical journals to reveal NREL's vital work in a real-world context for our stakeholders. Continuum provides insights into the latest and most impactful clean energy innovations, while spotlighting those talented researchers and unique facilities that make it all happen. This edition focuses on deliberate science.

  10. Young People and Caregivers' Perceptions of an Intervention Program for Children Who Deliberately Light Fires

    Science.gov (United States)

    Lambie, Ian; Seymour, Fred; Popaduk, Tanya

    2012-01-01

    A significant number of children and adolescents engage in deliberate fire setting, beyond the scope of curiosity and experimentation. Interventions developed to respond to the needs of such fire setters generally involve educational and/or psychosocial approaches. Research evaluating the effectiveness of these interventions is dominated by…

  11. Artificial light at night alters trophic interactions of intertidal invertebrates.

    Science.gov (United States)

    Underwood, Charlotte N; Davies, Thomas W; Queirós, Ana M

    2017-07-01

    Despite being globally widespread in coastal regions, the impacts of light pollution on intertidal ecosystems has received little attention. Intertidal species exhibit many night-time-dependent ecological strategies, including feeding, reproduction, orientation and predator avoidance, which are likely negatively affected by shifting light regimes, as has been observed in terrestrial and aquatic taxa. Coastal lighting may shape intertidal communities through its influence on the nocturnal foraging activity of dogwhelks (Nucella lapillus), a widespread predatory mollusc that structures biodiversity in temperate rocky shores. In the laboratory, we investigated whether the basal and foraging activity of this predator was affected by exposure to night-time lighting both in the presence and absence of olfactory predator cues (Carcinus maenas, common shore crab). Assessments of dogwhelks' behavioural responses to night-time white LED lighting were performed on individuals that had been acclimated to night-time white LED lighting conditions for 16 days and individuals that had not previously been exposed to artificial light at night. Dogwhelks acclimated to night-time lighting exhibited natural refuge-seeking behaviour less often compared to control animals, but were more likely to respond to and handle prey irrespective of whether olfactory predator cues were present. These responses suggest night-time lighting likely increased the energetic demand of dogwhelks through stress, encouraging foraging whenever food was available, regardless of potential danger. Contrastingly, whelks not acclimated under night-time lighting were more likely to respond to the presence of prey under artificial light at night when olfactory predator cues were present, indicating an opportunistic shift towards the use of visual instead of olfactory cues in risk evaluation. These results demonstrate that artificial night-time lighting influences the behaviour of intertidal fauna such that the

  12. What's crucial in night vision goggle simulation?

    Science.gov (United States)

    Kooi, Frank L.; Toet, Alexander

    2005-05-01

    Training is required to correctly interpret NVG imagery. Training night operations with simulated intensified imagery has great potential. Compared to direct viewing with the naked eye, intensified imagery is relatively easy to simulate and the cost of real NVG training is high (logistics, risk, civilian sleep deprivation, pollution). On the surface NVG imagery appears to have a structure similar to daylight imagery. However, in actuality its characteristics differ significantly from those of daylight imagery. As a result, NVG imagery frequently induces visual illusions. To achieve realistic training, simulated NVG imagery should at least reproduce the essential visual limitations of real NVG imagery caused by reduced resolution, reduced contrast, limited field-of-view, the absence of color, and the systems sensitivity to nearby infrared radiation. It is particularly important that simulated NVG imagery represents essential NVG visual characteristics, such as the high reflection of chlorophyll and halos. Current real-time simulation software falls short for training purposes because of an incorrect representation of shadow effects. We argue that the development of shading and shadowing merits priority to close the gap between real and simulated NVG flight conditions. Visual conspicuity can be deployed as an efficient metric to measure the 'perceptual distance' between the real NVG and the simulated NVG image.

  13. PARTICLE-larly Enriching Night at CERN!

    CERN Multimedia

    Yves-Marie Ducimetière

    2010-01-01

    After the 2010 European Researchers' Night, a contest was organised for its participants, asking them to write about their experience. We are now pleased to announce the winner: Yves-Marie Ducimetière, a 14-year-old student at the Lycée International de Ferney-Voltaire.    Yves-Marie Ducimetière. The visit began for me around 20.30, as we all joined our respective groups to board a CERN shuttle to our final destination, which was LHCb in my case. I was heading into the unknown! On leaving, I knew nothing about this place, and the discovery made it all the more interesting. Upon arriving, a woman explained that their research looked at antimatter, or rather, the reason why it disappeared from our Universe – she then accompanied us inside. Amazingly, I found the place to be both friendly and serious. One physicist spoke passionately about the purpose of LHCb, in short: colliding particles in order to understand the Big Bang, the origin of t...

  14. Night eating syndrome: How to treat it?

    Directory of Open Access Journals (Sweden)

    Thisciane Ferreira Pinto

    Full Text Available Summary Night eating syndrome (NES is characterized by caloric intake ≥ 25% of total daily after dinner and/or by two or more weekly nocturnal awakenings accompanied by food ingestion. Causes of NES are not entirely clear and seem to involve a desynchronization between the circadian rhythms of food ingestion and sleep, resulting in a delayed pattern of food intake. Estimates of the prevalence of NES in the general population are around 1.5%, and although much higher frequencies have been described in obese individuals, a causal relationship between NES and obesity is not clearly established. Since the first NES reports, several treatment modalities have been proposed, although, in many cases, the evidence is still insufficient and there is no consensus on the ideal approach. In order to conduct a critical review of proposed treatments for NES since its original description, a systematic search of articles published in journals indexed in Medline/Pubmed database in the period 1955-2015 was performed. Seventeen articles addressing non-pharmacological and pharmacological therapies met the selection criteria. Based on the articles analyzed, we conclude that serotonergic agents and psychological interventions, particularly cognitive behavioral therapy, have been shown to be effective for the treatment of NES. A combination of non-pharmacological and pharmacological therapies must be considered in future studies on the treatment of these patients.

  15. Krill (Meganyctiphanes norvegica) swim faster at night

    KAUST Repository

    Klevjer, Thor A.

    2011-05-01

    Krill are key members in marine food webs, and measurement of swimming speed is vital to assess their bioenergetic budgets, feeding, and encounters with predators. We document a consistent and marked diel signal in swimming speed of krill in their natural habitat that is not related to diel vertical migration. The results were obtained using a bottom-mounted, upward-looking echo sounder at 150-m depth in the Oslofjord, Norway, spanning 5 months from late autumn to spring at a temporal resolution of ~1–2 records s−1. Swimming speed was assessed using acoustic target tracking of individual krill. At the start of the registration period, both daytime and nocturnal average swimming speeds of Meganyctiphanes norvegica were ~ 3.5 cm s−1 (~ 1 body lengths ([bl] s−1) in waters with oxygen concentrations of ~ 15–20% O2 saturation. Following intrusion of more oxygenated water, nocturnal average swimming speeds increased to ~ 10 cm s−1 (~ 3 bl s−1), i.e., more than double that of daytime swimming speeds in the same period. We hypothesize that krill activity during the first period was limited by oxygen, and the enhanced swimming at night subsequent to the water renewal is due to increased feeding activity under lessened danger of predation in darkness.

  16. Visualization on the Day Night Year Globe

    International Nuclear Information System (INIS)

    Božić, Mirjana; Vušković, Leposava; Popović, Svetozar; Popović, Jelena; Marković-Topalović, Tatjana

    2016-01-01

    The story about a properly oriented outdoor globe in the hands and minds of Eratosthenes, Jefferson, Milanković and science educators is presented. Having the same orientation in space as the Earth, the Day Night Year Globe (DING) shows in real time the pattern of illumination of the Earth’s surface and its diurnal and seasonal variations. It is an ideal object for the visualization of knowledge and increase in knowledge about: the form of the Earth, Earth’s rotation, Earth’s revolution around the Sun, the length of seasons, solstices, equinoxes, the longitude problem, the distribution of the Sun’s radiation over the Earth, the impact of this radiation on Earth’s climate, and how to use it efficiently. By attaching a movable vane to the poles, or adding pins around the equator to read time, DING becomes a spherical/globe-shaped sundial. So, the DING is simultaneously useful for teaching physics, geophysics, astronomy, use of solar energy and promoting an inquiry-based learning environment for students and the public. (paper)

  17. Krill (Meganyctiphanes norvegica) swim faster at night

    KAUST Repository

    Klevjer, Thor A.; Kaartvedt, Stein

    2011-01-01

    Krill are key members in marine food webs, and measurement of swimming speed is vital to assess their bioenergetic budgets, feeding, and encounters with predators. We document a consistent and marked diel signal in swimming speed of krill in their natural habitat that is not related to diel vertical migration. The results were obtained using a bottom-mounted, upward-looking echo sounder at 150-m depth in the Oslofjord, Norway, spanning 5 months from late autumn to spring at a temporal resolution of ~1–2 records s−1. Swimming speed was assessed using acoustic target tracking of individual krill. At the start of the registration period, both daytime and nocturnal average swimming speeds of Meganyctiphanes norvegica were ~ 3.5 cm s−1 (~ 1 body lengths ([bl] s−1) in waters with oxygen concentrations of ~ 15–20% O2 saturation. Following intrusion of more oxygenated water, nocturnal average swimming speeds increased to ~ 10 cm s−1 (~ 3 bl s−1), i.e., more than double that of daytime swimming speeds in the same period. We hypothesize that krill activity during the first period was limited by oxygen, and the enhanced swimming at night subsequent to the water renewal is due to increased feeding activity under lessened danger of predation in darkness.

  18. Popular actions: For the right at night

    International Nuclear Information System (INIS)

    Suarez, Alfredo

    1999-01-01

    In 1997 a teacher of the school The Deer of Tauramena established a popular action against the companies that exploit the petroleum of the field Cusiana. Maria Ninfa Diaz and her husband Eleodoro Torres, a couple of peasants tormented behind from years by the presence in their sidewalk of gigantic firebrands that they burn natural gas as forced part of the oil activity. Burdened by the permanent noise of something like that as an enormous torch. Gone mad by the splendor in the nights of minuscule industrial suns. Tired by the increase of the temperature in their corner of the prairie. The life became less pleasant. Before the only sound was fluttering of the bats and the step of the livestock, actors of a time that became past in the immense green sea, when the plain was flat. Perhaps from the optics of the demanded companies this it is an ordinary litigation; it should be won to all coast, so much but when the companies needs to sit down a precedent that is already common place in the plain; doesn't enter with the oil companies and so that they didn't enter with the oil companies the defendants hired an lawyers office that gets paid per hours and they wait, eagerly, to rob Maria Ninfa Diaz of the property where she lives. The author continues relating the impasse between the peasant and the oil multinational company in Colombia

  19. Public Deliberation as a Teaching Andragogy: Implications for Adult Student Learning from a Doctoral Higher Education Policy Course

    Science.gov (United States)

    Johnson, Matthew; Partlo, Margaret; Hullender, Tammy; Akanwa, Emmanuel; Burke, Heather; Todd, Jerry; Alwood, Christine

    2014-01-01

    Public deliberation provides an inclusive and robust mechanism for making shared decisions in community and political settings; however, its application to teaching and learning remains underutilized (McMillan & Harriger, 2007). This manuscript reports on a case study of the use of public deliberation as a teaching andragogy in a graduate…

  20. Examining the scope and patterns of deliberate self-injurious cutting content in popular social media.

    Science.gov (United States)

    Miguel, Elizabeth M; Chou, Tommy; Golik, Alejandra; Cornacchio, Danielle; Sanchez, Amanda L; DeSerisy, Mariah; Comer, Jonathan S

    2017-09-01

    Social networking services (SNS) have rapidly become a central platform for adolescents' social interactions and media consumption patterns. The present study examined a representative sample of publicly accessible content related to deliberate self-injurious cutting across three SNS platforms: Twitter, Tumblr, and Instagram. Data collection simulated searches for publicly available deliberate self-injury content on Twitter, Tumblr, and Instagram. Over a six-month period at randomly generated time points, data were obtained by searching "#cutting" on each SNS platform and collecting the first 10 posts generated. Independent evaluators coded posts for presence of the following: (a) graphic content, (b) negative self-evaluations, (c) references to mental health terms, (d) discouragement of deliberate self-injury, and (e) recovery-oriented resources. Differences across platforms were examined. Data collection yielded a sample of 1,155 public posts (770 of which were related to mental health). Roughly 60% of sampled posts depicted graphic content, almost half included negative self-evaluations, only 9.5% discouraged self-injury, and Instagram posts displayed the greatest proportion of graphic content and negative self-evaluations, whereas Twitter exhibited the smallest proportion of each. Findings characterize the graphic nature of online SNS deliberate self-injury content and the relative absence of SNS-posted resources for populations seeking out deliberate self-injurious cutting content. Mental health professionals must recognize the rapidly changing landscape of adolescent media consumption, influences, and social interaction as they may pertain to self-harm patterns. © 2017 Wiley Periodicals, Inc.

  1. Comparing group deliberation to other forms of preference aggregation in valuing ecosystem services

    Directory of Open Access Journals (Sweden)

    Mackenzie B. Murphy

    2017-12-01

    Full Text Available Deliberative methods for valuing ecosystem services are hypothesized to yield group preferences that differ systematically from those that would be obtained through calculative aggregation of the preferences of participating individuals. We tested this hypothesis by comparing the group consensus results of structured deliberations against a variety of aggregation methods applied to individual participant preferences that were elicited both before and after the deliberations. Participants were also asked about their perceptions of the deliberative process, which we used to assess their ability to detect preference changes and identify the causes of any changes. For five of the seven groups tested, the group consensus results could not have been predicted from individual predeliberation preferences using any of the aggregation rules. However, individual postdeliberation preferences could be used to reconstruct the group preferences using consensual and rank-based aggregation rules. These results imply that the preferences of participants changed over the course of the deliberation and that the group preferences reflected a broad consensus on overall rankings rather than simply the pairwise preferences of the majority. Changes in individual preferences seem to have gone largely unnoticed by participants, as most stated that they did not believe their preferences had substantially changed. Most participants were satisfied with the outcome of the deliberation, and their degree of satisfaction was correlated with the feeling that their opinion was heard and that they had an influence on the outcome. Based on our results, group deliberation shows promise as a means of generating ecosystem service valuations that reflect a consensus opinion rather than simply a collection of personal preferences.

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  4. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  5. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  6. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  7. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  8. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  9. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  10. Dark nights reverse metabolic disruption caused by dim light at night.

    Science.gov (United States)

    Fonken, L K; Weil, Z M; Nelson, R J

    2013-06-01

    The increasing prevalence of obesity and related metabolic disorders coincides with increasing exposure to light at night. Previous studies report that mice exposed to dim light at night (dLAN) develop symptoms of metabolic syndrome. This study investigated whether mice returned to dark nights after dLAN exposure recover metabolic function. Male Swiss-Webster mice were assigned to either: standard light-dark (LD) conditions for 8 weeks (LD/LD), dLAN for 8 weeks (dLAN/dLAN), LD for 4 weeks followed by 4 weeks of dLAN (LD/dLAN), and dLAN for 4 weeks followed by 4 weeks of LD (dLAN/LD). After 4 weeks in their respective lighting conditions both groups initially placed in dLAN increased body mass gain compared to LD mice. Half of the dLAN mice (dLAN/LD) were then transferred to LD and vice versa (LD/dLAN). Following the transfer dLAN/dLAN and LD/dLAN mice gained more weight than LD/LD and dLAN/LD mice. At the conclusion of the study dLAN/LD mice did not differ from LD/LD mice with respect to weight gain and had lower fat pad mass compared to dLAN/dLAN mice. Compared to all other groups dLAN/dLAN mice decreased glucose tolerance as indicated by an intraperitoneal glucose tolerance test at week 7, indicating that dLAN/LD mice recovered glucose metabolism. dLAN/dLAN mice also increased MAC1 mRNA expression in peripheral fat as compared to both LD/LD and dLAN/LD mice, suggesting peripheral inflammation is induced by dLAN, but not sustained after return to LD. These results suggest that re-exposure to dark nights ameliorates metabolic disruption caused by dLAN exposure. Copyright © 2013 The Obesity Society.

  11. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  12. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  13. Xerostomia: A day and night difference

    International Nuclear Information System (INIS)

    Dijkema, Tim; Raaijmakers, Cornelis P.J.; Braam, Pètra M.; Roesink, Judith M.; Monninkhof, Evelyn M.; Terhaard, Chris H.J.

    2012-01-01

    Purpose: To compare patient-reported xerostomia during daytime and during nighttime with objectively measured parotid and submandibular gland function in a cohort of head-and-neck cancer (HNC) patients treated with RT. Materials and methods: A cohort of 138 HNC patients underwent objective measurements of parotid (PF) and submandibular (SMF) gland function and completed a xerostomia questionnaire (XQ) before RT, at 6 weeks, 6 months and 1 year after RT. No attempt was made to spare the submandibular gland(s). The XQ contained specific questions concerning the sensation of dry mouth during day- (XD) and nighttime (XN), scored on a 5-point Likert scale. Patients with no or mild (grade 1–3) xerostomia and patients with more severe (grade 4–5) complaints were grouped together. Results: Before RT, no association existed between dry mouth complaints and PF or SMF. At 6 weeks, 6 months and 1 year after RT; 37%, 51% and 36% had grade 4–5 XD and 65%, 64% and 56% had grade 4–5 XN, respectively. Patients with grade 4–5 XD and XN had significantly worse SMF at all time points after RT compared to patients with grade 1–3 XD and XN, while PF was significantly worse only at 6 weeks after RT. In multivariate analyses, SMF was consistently the most important factor related to XN after treatment. PF significantly influenced XD at 6 weeks and 1 year after RT. Conclusions: Differentiating between complaints during day- and nighttime in xerostomia research is necessary. Dry mouth at night is a frequent problem after (parotid-sparing) RT for HNC and is explained by submandibular gland dysfunction. Sparing of the contralateral submandibular gland, in addition to parotid gland sparing, may result in improved patient-reported xerostomia.

  14. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  15. Light at Night and Breast Cancer Risk Among California Teachers

    Science.gov (United States)

    Hurley, Susan; Goldberg, Debbie; Nelson, David; Hertz, Andrew; Horn-Ross, Pamela L.; Bernstein, Leslie; Reynolds, Peggy

    2014-01-01

    Background There is convincing evidence that circadian disruption mediated by exposure to light at night promotes mammary carcinogenesis in rodents. The role that light at night plays in human breast cancer etiology remains unknown. We evaluated the relationship between estimates of indoor and outdoor light at night and the risk of breast cancer among members of the California Teachers Study. Methods Indoor light-at-night estimates were based on questionnaire data regarding sleep habits and use of night time lighting while sleeping. Estimates of outdoor light at night were derived from imagery data obtained from the U.S. Defense Meteorological Satellite Program assigned to geocoded addresses of study participants. Analyses were conducted among 106,731 California Teachers Study members who lived in California, had no prior history of breast cancer, and provided information on lighting while sleeping. 5,095 cases of invasive breast cancer diagnosed 1995–2010 were identified via linkage to the California Cancer Registry. We used age-stratified Cox proportional hazard models to calculate hazard ratios (HRs) with 95% confidence intervals (CIs), adjusting for breast cancer risk factors and neighborhood urbanization and socioeconomic class. Results An increased risk was found for women living in areas with the highest quintile of outdoor light at night exposure estimates (HR=1.12 [95% CI=1.00 – 1.26], test for trend, P=0.06). While more pronounced among premenopausal women (HR=1.34 [95% CI=1.07 – 1.69], test for trend, P=0.04), the associations did not differ statistically by menopausal status (test for interaction, P=0.34). Conclusions Women living in areas with high levels of ambient light at night may be at an increased risk of breast cancer. Future studies that integrate quantitative measurements of indoor and outdoor light at night are warranted. PMID:25061924

  16. Students' educational experiences and interaction with residents on night shifts.

    Science.gov (United States)

    Schiller, Jocelyn; Sokoloff, Max; Tendhar, Chosang; Schmidt, John; Christner, Jennifer

    2017-08-01

    The purpose of this mixed-methods study was to investigate whether increased night shifts for students on paediatric rotations had any negative impact on their overall quality of educational experiences in light of the implementation of duty-hour restrictions. Both quantitative and qualitative data were collected from 30 students on paediatric rotations during the academic year 2011/12. Students completed two questionnaires, one in response to their experiences during the day shifts and another in response to their experiences during the night shifts. Only 25 cases were retained for the final analyses. The non-parametric Wilcoxon signed-rank test was used to analyse the quantitative data, and constant comparative thematic analyses, as described by Creswell, were used to analyse the qualitative data. [Do] increased nights shifts for students … [have] any negative impact on their overall quality of educational experiences[?] RESULTS: The results indicated that students' perceived quality of experiences during the night shifts was greater, compared with their day shifts. Students reported having more time to socialise during the night shifts. They further reported that informal ways of learning, such as impromptu teaching and spontaneous discussions on clinical problems, were more beneficial, and these often occurred in abundance during the night shifts as opposed to the scheduled didactic teaching sessions that occur during the day shifts. This study documented many unanticipated benefits of night shifts. The feeling of cohesiveness of the night team deserves further exploration, as this can be linked to better performance outcomes. More consideration should be given to implementing night shifts as a regular feature of clerkships. © 2016 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  17. Increased and mistimed sex hormone production in night shift workers.

    Science.gov (United States)

    Papantoniou, Kyriaki; Pozo, Oscar J; Espinosa, Ana; Marcos, Josep; Castaño-Vinyals, Gemma; Basagaña, Xavier; Juanola Pagès, Elena; Mirabent, Joan; Martín, Jordi; Such Faro, Patricia; Gascó Aparici, Amparo; Middleton, Benita; Skene, Debra J; Kogevinas, Manolis

    2015-05-01

    Night shift work has been associated with an increased risk for breast and prostate cancer. The effect of circadian disruption on sex steroid production is a possible underlying mechanism, underinvestigated in humans. We have assessed daily rhythms of sex hormones and melatonin in night and day shift workers of both sexes. We recruited 75 night and 42 day workers, ages 22 to 64 years, in different working settings. Participants collected urine samples from all voids over 24 hours on a working day. Urinary concentrations of 16 sex steroid hormones and metabolites (estrogens, progestagens, and androgens) and 6-sulfatoxymelatonin were measured in all samples. Mean levels and peak time of total and individual metabolite production were compared between night and day workers. Night workers had higher levels of total progestagens [geometric mean ratio (GMR) 1.65; 95% confidence intervals (CI), 1.17-2.32] and androgens (GMR: 1.44; 95% CI, 1.03-2.00), compared with day workers, after adjusting for potential confounders. The increased sex hormone levels among night shift workers were not related to the observed suppression of 6-sulfatoxymelatonin. Peak time of androgens was significantly later among night workers, compared with day workers (testosterone: 12:14 hours; 10:06-14:48 vs. 08:35 hours; 06:52-10:46). We found increased levels of progestagens and androgens as well as delayed peak androgen production in night shift workers compared with day workers. The increase and mistiming of sex hormone production may explain part of the increased risk for hormone-related cancers observed in night shift workers. ©2015 American Association for Cancer Research.

  18. Dynamic Analysis of the Evolution of Cereus peruvianus (Cactaceae Areas Attacked by Phoma sp.

    Directory of Open Access Journals (Sweden)

    Gyorgy FESZT

    2009-12-01

    Full Text Available Cereus Peruvianus (night blooming Cereus, or peruvian apple is one of the sensitive species to Phoma attack. Photographic images can intercept a certain phytopathology, at a certain moment. The computerized analysis of such an image turns into a value the spread which the phytopathological process has at that moment. The purpose of this study is to assimilate the technique of achieving successions of digital photos of Cereus peruvianus f. monstruosa attacked by Phoma sp. Parallely with recording the images, with the help of Rhythm digital temperature humidity controller, were recorded data about the green house microclimate (air humidity-minimum and maximum, temperature-minimum and maximum. In the first stage of the study, the attack presents small fluctuations, reaching a high level in days with low temperatures. So, the most significant growths were recorded in the periods: 10. 02. 2005-20. 02. 2005 with an affected area of 10.97-8.82 = 2.15 and 11. 03. 2005-22. 04. 2005 with growth differences of 14.67-13.32 = 1.35. Generally, the affected areas grow in days with low minimum temperatures. The great advantage of this technique is represented by the possibility of using in situ in home areas of species or crop plants in fields. Repeated images, achieved in time, then overlapped, can provide important data on the evolution of affected areas.

  19. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  20. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  1. The Voices of Women in the Night: Veronica and Judith

    Directory of Open Access Journals (Sweden)

    Shirley Walker

    2017-06-01

    Full Text Available quite often leave the radio playing all night on the bedside table; my only company in an all too empty house. It shuts out the noises of the night: the cry of the great owl in the rain-forest trees, the scurrying of possums on the roof, or the rustle of the neighbourhood carpet snake, a beautiful multi-coloured python, slithering into or out of the roof-space. I’m used to him (or her. She’s harmless —just another presence in the night.

  2. Childhood night terrors and sleepwalking: diagnosis and treatment

    Directory of Open Access Journals (Sweden)

    Sachin Ratan Gedam

    2017-12-01

    Full Text Available Night terrors and sleepwalking are arousal disorders that occur during the first third of night. Combined existence of sleep disorders are rare phenomenon and found to be associated with behavioural and emotional problems. It becomes difficult to diagnose among sleep disorders and epilepsy is an important differential diagnosis. Management with combined approach of pharmacotherapy and psychological counselling is safe and effective. Here, we present a case of night terrors and sleepwalking to highlight the importance of diagnosis and treatment in this condition. To conclude, all medical professionals need to be aware of different parasomnias and its treatment options.

  3. Experimental Assessment of Mechanical Night Ventilation on Inner Wall Surfaces

    DEFF Research Database (Denmark)

    Ji, Wenhui; Heiselberg, Per Kvols; Wang, Houhua

    2016-01-01

    The cooling potential of night ventilation largely depends on the heat exchange at the internal room surfaces. During night time, increased heat transfer on a vertical wall is expected due to cool supply air that flows along the internal wall surface from the top of the wall. This paper presents ...... an experimental study of the cooling of wall surfaces in a test room by mechanical night-time ventilation. Significant improvement of indoor thermal environment is presented resulting from the enhanced internal convection heat transfer....

  4. Light Pollution Awareness through Globe at Night & IYL2015

    Science.gov (United States)

    Walker, Constance E.

    2015-01-01

    The International Astronomical Union (IAU) will be coordinating extensive activities to raise awareness of light pollution through running the Cosmic Light theme of the International Year of Light (IYL2015) and by partnering in particular with the popular Globe at Night program.Globe at Night (www.globeatnight.org) is an international campaign to raise public awareness of the impact of light pollution by having people measure night-sky brightness and submit observations in real-time with smart phone or later with a computer. In 2015, Globe at Night will run for 10-nights each month, an hour after sunset til before the Moon rises. Students can use the data to monitor levels of light pollution around the world, as well as understand light pollution's effects on energy consumption, plants, wildlife, human health and our ability to enjoy a starry night sky.Since its inception in 2006, more than 115,000 measurements from 115 countries have been reported. The last 9 years of data can be explored with Globe at Night's interactive world map or with the 'map app' to view a particular area. A spreadsheet of the data is downloadable from any year. One can compare Globe at Night data with a variety of other databases to see, for example, how light pollution affects the foraging habits of bats.To encourage public participation in Globe at Night during IYL2015, each month will target an area of the world that habitually contributes during that time. Special concerns for how light pollution affects that area and solutions will be featured on the Globe at Night website (www.globeatnight.org), through its Facebook page, in its newsletter or in the 365DaysofAstronomy.org podcasts.Twice during IYL there will be a global Flash Mob event, one on Super Pi Day (March 14, 2015) and a second in mid-September, where the public will be invited to take night-sky brightness measurements en masse. In April, the International Dark-Sky Week hosted by the International Dark-Sky Association will be

  5. Complex sleep apnea after full-night and split-night polysomnography: the Greek experience.

    Science.gov (United States)

    Baou, Katerina; Mermigkis, Charalampos; Minaritzoglou, Aliki; Vagiakis, Emmanouil

    2017-12-08

    Treatment-emergent central sleep apnea (TE-CSA) is defined as the emergence or persistence of central respiratory events during the initiation of positive airway pressure (PAP) without a back-up rate in obstructive sleep apnea (OSA) patients and after significant resolution of obstructive events. Previous studies have estimated a prevalence from 0.56 to 20.3%. The aim of this study was to establish the prevalence of TE-CSA in a Greek adult population. One thousand fifty nine patients with newly diagnosed OSA, who were referred to the Sleep Disorders Center of Evangelismos Hospital of Athens over an 18-month period, were included in this study. A split-night polysomnography (PSG), or two formal overnight PSGs (diagnostic and continuous PAP (CPAP) titration study), were performed. Patients with OSA were divided in two groups; the first group included 277 patients, who underwent two separate studies (diagnostic and CPAP titration study), and the second group 782 patients, who underwent split-night studies. The prevalence of TE-CSA in the first group was 2.53% (7 patients), and in the second group was 5.63% (44 patients). The prevalence of TE-CSA in Greece was lower compared to most previous reported studies. The significant variation in the prevalence of TE-CSA between different centers throughout the world is mainly associated with the used diagnostic criteria as well as methodological and technical aspects.

  6. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  7. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  9. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  10. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  11. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  12. To Think or Not to Think:The Effect of Cognitive Deliberation on the Influence of Injunctive Versus Descriptive Social Norms

    NARCIS (Netherlands)

    Melnyk, V.; Herpen, van E.; Fischer, A.R.H.; Trijp, van H.C.M.

    2011-01-01

    Consumers can process information containing social norms at different cognitive deliberation levels. This paper investigates the effect of cognitive deliberation for both descriptive and injunctive norms. The experimental study examines the consequences for attitudes and behavioral intentions of

  13. Associations between number of consecutive night shifts and impairment of neurobehavioral performance during a subsequent simulated night shift.

    Science.gov (United States)

    Magee, Michelle; Sletten, Tracey L; Ferguson, Sally A; Grunstein, Ronald R; Anderson, Clare; Kennaway, David J; Lockley, Steven W; Rajaratnam, Shantha Mw

    2016-05-01

    This study aimed to investigate sleep and circadian phase in the relationships between neurobehavioral performance and the number of consecutive shifts worked. Thirty-four shift workers [20 men, mean age 31.8 (SD 10.9) years] worked 2-7 consecutive night shifts immediately prior to a laboratory-based, simulated night shift. For 7 days prior, participants worked their usual shift sequence, and sleep was assessed with logs and actigraphy. Participants completed a 10-minute auditory psychomotor vigilance task (PVT) at the start (~21:00 hours) and end (~07:00 hours) of the simulated night shift. Mean reaction times (RT), number of lapses and RT distribution was compared between those who worked 2-3 consecutive night shifts versus those who worked 4-7 shifts. Following 4-7 shifts, night shift workers had significantly longer mean RT at the start and end of shift, compared to those who worked 2-3 shifts. The slowest and fastest 10% RT were significantly slower at the start, but not end, of shift among participants who worked 4-7 nights. Those working 4-7 nights also demonstrated a broader RT distribution at the start and end of shift and had significantly slower RT based on cumulative distribution analysis (5 (th), 25 (th), 50 (th), 75 (th)percentiles at the start of shift; 75th percentile at the end of shift). No group differences in sleep parameters were found for 7 days and 24 hours prior to the simulated night shift. A greater number of consecutive night shifts has a negative impact on neurobehavioral performance, likely due to cognitive slowing.

  14. Relationship of night and shift work with weight change and lifestyle behaviors.

    OpenAIRE

    Bekkers, M.B.M; Koppes, L.L.J.; Rodenburg, W.; Steeg, H. van; Proper, K.I.

    2015-01-01

    Objective: To prospectively study the association of night and shift work with weight change and lifestyle behaviors. Methods: Workers participating in the Netherlands Working Conditions Cohort Study (2008 and 2009) (N = 5951) reported night and shift work, weight and height. Groups included stable night or shift work, from day work to night or shift work, from night or shift work to day work, and no night or shift work in 2008 and 2009. Regression analyses were used to study association chan...

  15. "While you still think, I already type": experienced social power reduces deliberation during e-mail communication.

    Science.gov (United States)

    Scholl, Annika; Sassenberg, Kai

    2014-11-01

    E-mail allows individuals to deliberate on their communication before sending it off. For instance, communication partners can easily take their time to ponder how best to frame a request before they actually send a message. Individuals at times strategically exploit this opportunity to deliberate in order to tailor messages to their communication partner, such as when communicating with a relatively more powerful person. As social power reduces concerns about impression management, we predicted that individuals deliberate more while composing e-mail messages under low (vs. high) power. This assumption was tested with well-established power priming. As such, we expected that experienced power in one context would diminish deliberation times during a subsequent e-mail communication. An experiment manipulating the experience of (low vs. high) power and measuring deliberation times during e-mail composition supported this hypothesis. The findings thus indicate how social power alters deliberation times. More importantly, the results show that individuals not only strategically deliberate during e-mail communication in line with their current situation, but also in line with their social standing in a previous situation (here, their experience of power).

  16. Genetics Home Reference: autosomal dominant congenital stationary night blindness

    Science.gov (United States)

    ... collapse boxes. Description Autosomal dominant congenital stationary night blindness is a disorder of the retina , which is the specialized tissue at the back of the eye that detects light and color. People with this condition typically have difficulty seeing ...

  17. Genetics Home Reference: X-linked congenital stationary night blindness

    Science.gov (United States)

    ... collapse boxes. Description X-linked congenital stationary night blindness is a disorder of the retina , which is the specialized tissue at the back of the eye that detects light and color. People with this condition typically have difficulty seeing ...

  18. Genetics Home Reference: autosomal recessive congenital stationary night blindness

    Science.gov (United States)

    ... collapse boxes. Description Autosomal recessive congenital stationary night blindness is a disorder of the retina , which is the specialized tissue at the back of the eye that detects light and color. People with this condition typically have difficulty seeing ...

  19. Disruption of Circadian Rhythms by Light During Day and Night.

    Science.gov (United States)

    Figueiro, Mariana G

    2017-06-01

    This study aims to discuss possible reasons why research to date has not forged direct links between light at night, acute melatonin suppression or circadian disruption, and risks for disease. Data suggest that irregular light-dark patterns or light exposures at the wrong circadian time can lead to circadian disruption and disease risks. However, there remains an urgent need to: (1) specify light stimulus in terms of circadian rather than visual response; (2) when translating research from animals to humans, consider species-specific spectral and absolute sensitivities to light; (3) relate the characteristics of photometric measurement of light at night to the operational characteristics of the circadian system; and (4) examine how humans may be experiencing too little daytime light, not just too much light at night. To understand the health effects of light-induced circadian disruption, we need to measure and control light stimulus during the day and at night.

  20. Digital Enhancement of Night Vision and Thermal Images

    National Research Council Canada - National Science Library

    Teo, Chek

    2003-01-01

    .... This thesis explores the effect of the Contrast Limited Adaptive Histogram Equalization (CLAHE) process on night vision and thermal images With better contrast, target detection and discrimination can be improved...

  1. Dim light at night increases body mass of female mice.

    Science.gov (United States)

    Aubrecht, Taryn G; Jenkins, Richelle; Nelson, Randy J

    2015-05-01

    During the past century, the prevalence of light at night has increased in parallel with obesity rates. Dim light at night (dLAN) increases body mass in male mice. However, the effects of light at night on female body mass remain unspecified. Thus, female mice were exposed to a standard light/dark (LD; 16 h light at ∼150 lux/8 h dark at ∼0 lux) cycle or to light/dim light at night (dLAN; 16 h light at ∼150 lux/8 h dim light at ∼5 lux) cycles for six weeks. Females exposed to dLAN increased the rate of change in body mass compared to LD mice despite reduced total food intake during weeks five and six, suggesting that dLAN disrupted circadian rhythms resulting in deranged metabolism.

  2. European Researchers Night, Students on Shift at ALICE

    CERN Multimedia

    Fons Rademakers

    2010-01-01

    During European Researchers' Night, on Friday 24 September 2010, from 17:00 to 24:00, pupils from French and Swiss schools visited ALICE and took shifts in the control room, helping the ALICE physicists run the experiment.

  3. A Most Rare Vision: Improvisations on "A Midsummer Night's Dream."

    Science.gov (United States)

    Hakaim, Charles J., Jr.

    1993-01-01

    Describes one teacher's methods for introducing to secondary English students the concepts of improvisation, experimentation, and innovation. Discusses numerous techniques for fostering such skills when working with William Shakespeare's "A Midsummer Night's Dream." (HB)

  4. Measured energy savings from using night temperature setback

    International Nuclear Information System (INIS)

    Szydlowski, R.F.; Wrench, L.E.; O'Neill, P.J.

    1993-01-01

    The measured energy savings resulting from using night temperature setback in typical light-construction wooden office buildings was determined. Researchers installed monitoring equipment in a six-building sample of two-story wooden buildings at Fort Devens, Massachusetts. Data obtained during both single-setting and night-setback operating modes were used to develop models of each building's heat consumption as a function of the difference between inside and outside temperature. These models were used to estimate seasonal savings that could be obtained from the use of night-setback thermostat control. The measured savings in heating energy from using night temperature setback for the six Fort Devens buildings ranged from 14% to 25%; the mean savings was 19.2%. Based on an energy cost of $0.65/therm of natural gas, the estimated average cost savings of using automatic setback thermostats in these buildings is $780 per year per building

  5. Cooling of the Building Structure by Night-time Ventilation

    DEFF Research Database (Denmark)

    Artmann, Nikolai

    In modern, extensively glazed office buildings, due to high solar and internal loads and increased comfort expectations, air conditioning is increasingly applied even in moderate and cold climates, like in Central and Northern Europe. Particularly in these cases, night-time ventilation is often......, without considering any building-specific parameters. A method for quantifying the climatic cooling potential (CCP) was developed based on degree-hours of the difference between building and external air temperature. Applying this method to climatic data of 259 stations shows very high night cooling...... potential over the whole of Northern Europe and still significant potential in Central, Eastern and even some regions of Southern Europe. However, due to the inherent stochastic properties of weather patterns, series of warmer nights can occur at some locations, where passive cooling by night...

  6. Passive Cooling of buildings by night-time ventilation

    DEFF Research Database (Denmark)

    Artmann, Nikolai; Manz, Heinrich; Heiselberg, Per

    coefficients below about 4 W/m2K. Heat transfer during night-time ventilation in case of mixing and displacement ventilation was investigated in a full scale test room at Aalborg University. In the experiments the temperature efficiency of the ventilation was determined. Based on the previous re-sults a method...... are still hesitant to apply passive cooling techniques. As night-time ventilation is highly dependent on climatic conditions, a method for quantifying the climatic cooling potential was developed and the impact of climate warming was investigated. Although a clear decrease was found, significant potential...... will remain, especially if night-time ventilation is applied in combination with other cooling methods. Building energy simulations showed that the performance of night-time ventilation is also affected by the heat transfer at internal room surfaces, as the cooling effect is very limited for heat transfer...

  7. The Globe of Science and Innovation at night

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    The Globe of Science and Innovation, CERN's exhibition centre is seen lit up at night. This wooden building was given to CERN in 2004 as a gift from the Swiss Confederation to mark 50 years since the Organization's foundation.

  8. Deliberate ingestion of foreign bodies by institutionalised psychiatric hospital patients and prison inmates.

    LENUS (Irish Health Repository)

    O'Sullivan, S T

    2012-02-03

    Deliberate and recurrent foreign body ingestion is a common problem among institutionalised patients. We review our experience with 36 cases of deliberate foreign body ingestion by prisoners or psychiatric patients, thirty of whom were institutionalised at the time of ingestion. Symptoms were frequently severe in the prison inmate group but, in contrast, psychiatric patients presented with few, if any, symptoms. A majority of objects pass spontaneously or remain in situ without complication. Twenty-four patients were discharged following initial evaluation and without specific treatment. Eight of these were reviewed electively and discharged within one week. Twelve patients were admitted for observation, seven of whom were discharged within 48 hrs. Upper gastrointestinal endoscopy was performed in four patients and an intragastric foreign body identified in two cases. Laparotomy was performed in two cases for unresolving mechanical intestinal obstruction. Management should be conservative when possible, with surgery indicated only for complications.

  9. Aristotle’s contribution to the deliberation from a bioethical perspective

    Directory of Open Access Journals (Sweden)

    Mario Orlando Parra-Pineda

    2017-10-01

    Full Text Available Deliberation is a basic rational human activity recognized since ancient times due to its role in decision making during daily life activities and in specialized areas of knowledge such as medicine, politics and ethics. The objective of this reflection paper is to study the contribution of Aristotle to the deliberative process through his work the Nicomachean Ethics, where the following aspects of deliberation were identified for analysis: origin, definition, characteristics, and types and conditions for its development. Bioethics defend these aspects, since it finds in Aristotelian phronesis the fundamental axis to guide its actions in search of human self-realization and the analysis and decision making of the clinical bioethical problems. Twenty-four centuries have passed until the importance of this process and the need to educate about it was finally rediscovered.

  10. Deliberations of working group 3: stakeholders and the public: who are they?

    International Nuclear Information System (INIS)

    Webster, S.

    2000-01-01

    The working-group deliberations opened with a general discussion centred primarily around the issues introduced in the two papers presented that morning in plenary session: 'Who Are Stakeholders in Environmental Risk Decisions?' and 'Participation of Stakeholders in Waste Management Decisions: The German Experience'. In general, the interventions by the group were open and frank and adequately covered the key issues of the subject. This was followed by a presentation on the views and experience of the current siting debate in Sweden from the perspective of the regulatory bodies and a brief summary by the Chairman of the definition of the public in EU legislation and International Conventions. The majority of the working-group members contributed actively to the debate, and the discussions were conducted in an informal and open-minded manner. Hereinafter are the main observations made during the working group deliberations. (author)

  11. Deliberate self-harming application of superglue in the nose: case report and literature review.

    Science.gov (United States)

    Tikka, T; Al Abduwani, J; Costello, D

    2015-01-01

    Accidental and non-accidental applications of superglue in the ear, nose and oral cavity have been reported previously. Surgical removal of glue from the nose is the current practice. This paper reports the case of an 18-year-old female, who presented with complete bilateral nasal occlusion due to deliberate self-application of superglue in both nostrils to avoid nasogastric tube insertion. Removal of glue was accomplished with a combination of local anaesthetic cream and acetone-soaked cotton buds, which caused only minimal discomfort to the patient. All traces of glue disappeared within 10 days, without causing damage to the nasal mucosa, nasal blockage or pain. To the best of our knowledge, this is the first case report of deliberate self-application of superglue in the nose. A successful non-surgical management option for the removal of glue from the nose is introduced.

  12. Night Shift Work and Risk of Breast Cancer.

    Science.gov (United States)

    Hansen, Johnni

    2017-09-01

    Night work is increasingly common and a necessity in certain sectors of the modern 24-h society. The embedded exposure to light-at-night, which suppresses the nocturnal hormone melatonin with oncostatic properties and circadian disruption, i.e., misalignment between internal and external night and between cells and organs, are suggested as main mechanisms involved in carcinogenesis. In 2007, the International Agency for Research on Cancer (IARC) classified shift work that involves circadian disruption as probably carcinogenic to humans based on limited evidence from eight epidemiologic studies on breast cancer, in addition to sufficient evidence from animal experiments. The aim of this review is a critical update of the IARC evaluation, including subsequent and the most recent epidemiologic evidence on breast cancer risk after night work. After 2007, in total nine new case-control studies, one case-cohort study, and eight cohort studies are published, which triples the number of studies. Further, two previous cohorts have been updated with extended follow-up. The assessment of night shift work is different in all of the 26 existing studies. There is some evidence that high number of consecutive night shifts has impact on the extent of circadian disruption, and thereby increased breast cancer risk, but this information is missing in almost all cohort studies. This in combination with short-term follow-up of aging cohorts may explain why some cohort studies may have null findings. The more recent case-control studies have contributed interesting results concerning breast cancer subtypes in relation to both menopausal status and different hormonal subtypes. The large differences in definitions of both exposure and outcome may contribute to the observed heterogeneity of results from studies of night work and breast cancer, which overall points in the direction of an increased breast cancer risk, in particular after over 20 years of night shifts. Overall, there is a

  13. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  14. Ad libitum and restricted day and night sleep architecture.

    Science.gov (United States)

    Korompeli, Anna St; Muurlink, Olav; Gavala, Alexandra; Myrianthefs, Pavlos; Fildissis, Georgios; Baltopoulos, Georgios

    2016-01-01

    This study represents a first controlled comparison of restricted versus unrestricted sleep in both day and night sleep categories. A repeated measures study of a homogenous group of young women without sleep disorders (n=14) found that stage 1, 2, 3 and REM sleep, as well as sleep latency were not statistically different between day ad libitum sleep (DAL) and day interrupted (DI) sleep categories, while night interrupted (NI) and ad libitum (NAL) sleep showed strikingly different architecture.

  15. Patient Handoffs: Is Cross Cover or Night Shift Better?

    Science.gov (United States)

    Higgins, Alanna; Brannen, Melissa L; Heiman, Heather L; Adler, Mark D

    2017-06-01

    Studies show singular handoffs between health care providers to be risky. Few describe sequential handoffs or compare handoffs from different provider types. We investigated the transfer of information across 2 handoffs using a piloted survey instrument. We compared cross-cover (every fourth night call) with dedicated night-shift residents. Surveys assessing provider knowledge of hospitalized patients were administered to pediatric residents. Primary teams were surveyed about their handoff upon completion of daytime coverage of a patient. Night-shift or cross-covering residents were surveyed about their handoff of the same patient upon completion of overnight coverage. Pediatric hospitalists rated the consistency of information between the surveys. Absolute difference was calculated between the 2 providers' rating of a patient's (a) complexity and (b) illness severity. Scores were compared across provider type. Fifty-nine complete handoff pairs were obtained. Fourteen and 45 handoff surveys were completed by a cross-covering and a night-shift provider, respectively. There was no significant difference in information consistency between primary and night-shift (median, 4.0; interquartile range [IQR], 3-4) versus primary and cross-covering providers (median, 4.0; IQR, 3-4). There was no significant difference in median patient complexity ratings (night shift, 3.0; IQR, 1-5, versus cross cover, 3.5; IQR, 1-5) or illness severity ratings (night shift, 2.0; IQR, 1-4, versus cross-cover, 3.0; IQR, 1-6) when comparing provider types giving a handoff. We did not find a difference in physicians' transfer of information during 2 handoffs among providers taking traditional call or on night shift. Development of tools to measure handoff consistency is needed.

  16. The effects of hot nights on mortality in Barcelona, Spain

    Science.gov (United States)

    Royé, D.

    2017-12-01

    Heat-related effects on mortality have been widely analyzed using maximum and minimum temperatures as exposure variables. Nevertheless, the main focus is usually on the former with the minimum temperature being limited in use as far as human health effects are concerned. Therefore, new thermal indices were used in this research to describe the duration of night hours with air temperatures higher than the 95% percentile of the minimum temperature (hot night hours) and intensity as the summation of these air temperatures in degrees (hot night degrees). An exposure-response relationship between mortality due to natural, respiratory, and cardiovascular causes and summer night temperatures was assessed using data from the Barcelona region between 2003 and 2013. The non-linear relationship between the exposure and response variables was modeled using a distributed lag non-linear model. The estimated associations for both exposure variables and mortality shows a relationship with high and medium values that persist significantly up to a lag of 1-2 days. In mortality due to natural causes, an increase of 1.1% per 10% (CI95% 0.6-1.5) for hot night hours and 5.8% per each 10° (CI95% 3.5-8.2%) for hot night degrees is observed. The effects of hot night hours reach their maximum with 100% and lead to an increase by 9.2% (CI95% 5.3-13.1%). The hourly description of night heat effects reduced to a single indicator in duration and intensity is a new approach and shows a different perspective and significant heat-related effects on human health.

  17. Do Wild Great Tits Avoid Exposure to Light at Night?

    Directory of Open Access Journals (Sweden)

    Maaike de Jong

    Full Text Available Studies of wild populations have provided important insights into the effects of artificial light at night on organisms, populations and ecosystems. However, in most studies the exact amount of light at night individuals are exposed to remains unknown. Individuals can potentially control their nighttime light exposure by seeking dark spots within illuminated areas. This uncertainty makes it difficult to attribute effects to a direct effect of light at night, or to indirect effects, e.g., via an effect of light at night on food availability. In this study, we aim to quantify the nocturnal light exposure of wild birds in a previously dark forest-edge habitat, experimentally illuminated with three different colors of street lighting, in comparison to a dark control. During two consecutive breeding seasons, we deployed male great tits (Parus major with a light logger measuring light intensity every five minutes over a 24h period. We found that three males from pairs breeding in brightly illuminated nest boxes close to green and red lamp posts, were not exposed to more artificial light at night than males from pairs breeding further away. This suggests, based on our limited sample size, that these males could have been avoiding light at night by choosing a roosting place with a reduced light intensity. Therefore, effects of light at night previously reported for this species in our experimental set-up might be indirect. In contrast to urban areas where light is omnipresent, bird species in non-urban areas may evade exposure to nocturnal artificial light, thereby avoiding direct consequences of light at night.

  18. The control of deliberate waiting strategies in a stop-signal task

    Directory of Open Access Journals (Sweden)

    R.P. Sylwan

    2004-06-01

    Full Text Available To inhibit an ongoing flow of thoughts or actions has been largely considered to be a crucial executive function, and the stop-signal paradigm makes inhibitory control measurable. Stop-signal tasks usually combine two concurrent tasks, i.e., manual responses to a primary task (go-task are occasionally countermanded by a stimulus which signals participants to inhibit their response in that trial (stop-task. Participants are always instructed not to wait for the stop-signal, since waiting strategies cause the response times to be unstable, invalidating the data. The aim of the present study was to experimentally control the strategies of waiting deliberately for the stop-signal in a stop-task by means of an algorithm that measured the variation in the reaction times to go-stimuli on-line, and displayed a warning legend urging participants to be faster when their reaction times were more than two standard deviations of the mean. Thirty-four university students performed a stop-task with go- and stop-stimuli, both of which were delivered in the visual modality and were lateralized within the visual field. The participants were divided into two groups (group A, without the algorithm, vs group B, with the algorithm. Group B exhibited lower variability of reaction times to go-stimuli, whereas no significant between-group differences were found in any of the measures of inhibitory control, showing that the algorithm succeeded in controlling the deliberate waiting strategies. Differences between deliberate and unintentional waiting strategies, and anxiety as a probable factor responsible for individual differences in deliberate waiting behavior, are discussed.

  19. Detecting the Evolution of Deliberate Fertility Control before the Demographic Transition in Germany

    Directory of Open Access Journals (Sweden)

    Aliaksandr Amialchuk

    2012-10-01

    Full Text Available BACKGROUND Pervious literature has established the existence of deliberate non-parity-specific fertility control in pre-transitional populations. However, less focus has been given to the timing of its onset. In addition, previous studies focused on the changes in fertility in response to the local prices of grains, which may be endogenous. OBJECTIVE This paper studies the emergence and evolution of deliberate fertility control by investigating the link between child mortality and economic stress on the one hand and non-parity-specific birth control on the other, in historic German villages between 1700 and 1900. METHODS Birth histories from fourteen German villages (1700-1900 and rye price series are used in a micro-level event history analysis. The fertility response of second and higher-order births to the mortality of children over age two and exogenous fluctuations in rye price are used as measures of the extent of deliberate non-parity-specific birth control. RESULTS Over the course of the demographic transition, the effect of the death of children generally increases after controlling for the effect of the death of children less than two years old. The negative fertility response to high rye prices before and in the year immediately following the price change occurred only after 1800. CONCLUSIONS The replacement and insurance effects associated with child mortality generally increased before the demographic transition. The emergence of the negative effect of high rye prices on fertility after 1800 further supports the presence and evolution of deliberate non-parity-specific fertility control before the demographic transition.

  20. Deliberation before determination: the definition and evaluation of good decision making.

    Science.gov (United States)

    Elwyn, Glyn; Miron-Shatz, Talya

    2010-06-01

    In this article, we examine definitions of suggested approaches to measure the concept of good decisions, highlight the ways in which they converge, and explain why we have concerns about their emphasis on post-hoc estimations and post-decisional outcomes, their prescriptive concept of knowledge, and their lack of distinction between the process of deliberation, and the act of decision determination. There has been a steady trend to involve patients in decision making tasks in clinical practice, part of a shift away from paternalism towards the concept of informed choice. An increased understanding of the uncertainties that exist in medicine, arising from a weak evidence base and, in addition, the stochastic nature of outcomes at the individual level, have contributed to shifting the responsibility for decision making from physicians to patients. This led to increasing use of decision support and communication methods, with the ultimate aim of improving decision making by patients. Interest has therefore developed in attempting to define good decision making and in the development of measurement approaches. We pose and reflect whether decisions can be judged good or not, and, if so, how this goodness might be evaluated. We hypothesize that decisions cannot be measured by reference to their outcomes and offer an alternative means of assessment, which emphasizes the deliberation process rather than the decision's end results. We propose decision making comprises a pre-decisional process and an act of decision determination and consider how this model of decision making serves to develop a new approach to evaluating what constitutes a good decision making process. We proceed to offer an alternative, which parses decisions into the pre-decisional deliberation process, the act of determination and post-decisional outcomes. Evaluating the deliberation process, we propose, should comprise of a subjective sufficiency of knowledge, as well as emotional processing and