WorldWideScience

Sample records for exacerbated myoclonic attacks

  1. Viral attack exacerbates the susceptibility of a bloom-forming alga to ocean acidification.

    Science.gov (United States)

    Chen, Shanwen; Gao, Kunshan; Beardall, John

    2015-02-01

    Both ocean acidification and viral infection bring about changes in marine phytoplankton physiological activities and community composition. However, little information is available on how the relationship between phytoplankton and viruses may be affected by ocean acidification and what impacts this might have on photosynthesis-driven marine biological CO2 pump. Here, we show that when the harmful bloom alga Phaeocystis globosa is infected with viruses under future ocean conditions, its photosynthetic performance further decreased and cells became more susceptible to stressful light levels, showing enhanced photoinhibition and reduced carbon fixation, up-regulation of mitochondrial respiration and decreased virus burst size. Our results indicate that ocean acidification exacerbates the impacts of viral attack on P. globosa, which implies that, while ocean acidification directly influences marine primary producers, it may also affect them indirectly by altering their relationship with viruses. Therefore, viruses as a biotic stressor need to be invoked when considering the overall impacts of climate change on marine productivity and carbon sequestration. © 2014 John Wiley & Sons Ltd.

  2. Coherence analysis differentiates between cortical myoclonic tremor and essential tremor

    NARCIS (Netherlands)

    van Rootselaar, AF; Maurits, NM; Koelman, JHTM; van der Hoeven, JH; Bour, LJ; Leenders, KL; Brown, P; Tijssen, MAJ

    Familial cortical myoclonic tremor with epilepsy (FCMTE) is characterized by a distal kinetic tremor, infrequent epileptic attacks, and autosomal dominant inheritance. The tremor is thought to originate from the motor cortex. In our patient group, a premovement cortical spike Could not be

  3. Role of bacterial infection in the exacerbation of acute or prolonged asthma attack in children

    Directory of Open Access Journals (Sweden)

    Yoko Nagayama

    1999-01-01

    Full Text Available Quantitatively cultured bacteria in sputum sampled from asthmatic children aged 0–14 years was examined to determine whether there is a relationship between asthmatic states and bacterial species present in the respiratory tract. We used cytological examination to improve the specificity of pathogens cultured in sputum. Asthmatic children were divided into three groups: (i group 1, acute asthma attack (n=191; (ii group 2, prolonged asthma attack (n=68; and (iii group 3, pneumonia without asthma attack (n=39. The number of specimens was 212, 75 and 44 for groups 1, 2 and 3, respectively. The number of specimens with pathogenic bacteria present in group 1 decreased with age, from 36.8% in infants under 1 year of age to 8.7% in children over the age of 9 years. The species of bacteria in group 1 were Haemophilus influenzae, Streptococcus pneumoniae, Moraxella catarrhalis and these were distributed evenly in the samples. In group 2, pathogenic bacteria were present in 34.7% of patients (26/75, peaking at over 40% among children between 4 and 8 years of age. The presence of H. influenzae was dominant in group 2. The percentage of pathogenic bacteria present in group 3 specimens was 40.9%. The data suggest that there is a significant relationship between the presence of bacteria in sputum and clinical symptoms, such as fever and pneumonic episodes, during acute asthma attacks.

  4. Familial benign nonprogressive myoclonic epilepsies.

    Science.gov (United States)

    Striano, Pasquale; de Falco, Fabrizio A; Minetti, Carlo; Zara, Federico

    2009-05-01

    Work on the classification of epileptic syndromes is ongoing, and many syndromes are still under discussion. In particular, special difficulty still persists in correctly classifying epilepsies with myoclonic seizures. The existence of special familial epileptic syndromes primarily showing myoclonic features has been recently suggested on the basis of a clear pattern of inheritance or on the identification of new chromosomal genetic loci linked to the disease. These forms in development include familial infantile myoclonic epilepsy (FIME), benign adult familial myoclonic epilepsy (BAFME), or autosomal dominant cortical myoclonus and epilepsy (ADCME), and, maybe, adult-onset myoclonic epilepsy (AME). In the future, the identification of responsible genes and the protein products will contribute to our understanding of the molecular pathways of epileptogenesis and provide neurobiologic criteria for the classification of epilepsies, beyond the different phenotypic expression.

  5. Progressive myoclonic epilepsies

    Science.gov (United States)

    Michelucci, Roberto; Canafoglia, Laura; Striano, Pasquale; Gambardella, Antonio; Magaudda, Adriana; Tinuper, Paolo; La Neve, Angela; Ferlazzo, Edoardo; Gobbi, Giuseppe; Giallonardo, Anna Teresa; Capovilla, Giuseppe; Visani, Elisa; Panzica, Ferruccio; Avanzini, Giuliano; Tassinari, Carlo Alberto; Bianchi, Amedeo; Zara, Federico

    2014-01-01

    Objective: To define the clinical spectrum and etiology of progressive myoclonic epilepsies (PMEs) in Italy using a database developed by the Genetics Commission of the Italian League against Epilepsy. Methods: We collected clinical and laboratory data from patients referred to 25 Italian epilepsy centers regardless of whether a positive causative factor was identified. PMEs of undetermined origins were grouped using 2-step cluster analysis. Results: We collected clinical data from 204 patients, including 77 with a diagnosis of Unverricht-Lundborg disease and 37 with a diagnosis of Lafora body disease; 31 patients had PMEs due to rarer genetic causes, mainly neuronal ceroid lipofuscinoses. Two more patients had celiac disease. Despite extensive investigation, we found no definitive etiology for 57 patients. Cluster analysis indicated that these patients could be grouped into 2 clusters defined by age at disease onset, age at myoclonus onset, previous psychomotor delay, seizure characteristics, photosensitivity, associated signs other than those included in the cardinal definition of PME, and pathologic MRI findings. Conclusions: Information concerning the distribution of different genetic causes of PMEs may provide a framework for an updated diagnostic workup. Phenotypes of the patients with PME of undetermined cause varied widely. The presence of separate clusters suggests that novel forms of PME are yet to be clinically and genetically characterized. PMID:24384641

  6. Genetics Home Reference: spinal muscular atrophy with progressive myoclonic epilepsy

    Science.gov (United States)

    ... myoclonic epilepsy Spinal muscular atrophy with progressive myoclonic epilepsy Printable PDF Open All Close All Enable Javascript ... boxes. Description Spinal muscular atrophy with progressive myoclonic epilepsy (SMA-PME) is a neurological condition that causes ...

  7. Homozygous TBC1D24 mutation in two siblings with familial infantile myoclonic epilepsy (FIME) and moderate intellectual disability.

    Science.gov (United States)

    Poulat, Anne-Lise; Ville, Dorothée; de Bellescize, Julitta; André-Obadia, Nathalie; Cacciagli, Pierre; Milh, Mathieu; Villard, Laurent; Lesca, Gaetan

    2015-03-01

    Mutations in the TBC1D24 gene were first reported in an Italian family with a unique epileptic phenotype consisting of drug-responsive, early-onset idiopathic myoclonic seizures. Patients presented with isolated bilateral or focal myoclonia, which could evolve to long-lasting attacks without loss of consciousness, with a peculiar reflex component, and were associated with generalized tonic-clonic seizures. This entity was named "familial infantile myoclonic epilepsy" (FIME). More recently, TBC1D24 mutations have been shown to cause a variable range of disorders, including epilepsy of various seizure types and severity, non-syndromic deafness, and DOORS syndrome. We report on the electro-clinical features of two brothers, born to first-cousin parents, affected with infantile-onset myoclonic epilepsy. The peculiar epileptic presentation prompted us to perform direct sequencing of the TBC1D24 gene. The patients had very early onset of focal myoclonic fits with variable topography, lasting a few minutes to several hours, without loss of consciousness, which frequently evolved to generalized myoclonus or myoclonic status. Reflex myoclonia were noticed in one patient. Neurological outcome was marked by moderate intellectual disability. Despite the high frequency of seizures, repeated EEG recordings showed normal background rhythm and rare interictal spikes and waves. We found a homozygous missense mutation, c.457G>A/p.Glu153Lys, in the two affected brothers. This observation combined with recent data from the literature, suggest that mutations in TBCD24 cause a pathological continuum, with FIME at the "benign" end and severe drug-refractory epileptic encephalopathy on the severe end. Early-onset myoclonic epilepsy with focal and generalized myoclonic seizures is a common characteristic of this continuum. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Juvenile myoclonic epilepsy: clinical and EEG features

    DEFF Research Database (Denmark)

    Pedersen, S B; Petersen, K A

    1998-01-01

    We aimed to characterize the clinical profile and EEG features of 43 patients with juvenile myoclonic epilepsy. In a retrospective design we studied the records of, and re-interviewed, 43 patients diagnosed with JME from the epilepsy clinic data base. Furthermore, available EEGs were re...... were sleep deprivation (84%), stress (70%), and alcohol consumption (51%). EEG findings included rapid spike-wave and polyspike-wave....

  9. Juvenile myoclonic epilepsy: clinical and EEG features

    DEFF Research Database (Denmark)

    Pedersen, S B; Petersen, K A

    1998-01-01

    We aimed to characterize the clinical profile and EEG features of 43 patients with juvenile myoclonic epilepsy. In a retrospective design we studied the records of, and re-interviewed, 43 patients diagnosed with JME from the epilepsy clinic data base. Furthermore, available EEGs were re-evaluated...... were sleep deprivation (84%), stress (70%), and alcohol consumption (51%). EEG findings included rapid spike-wave and polyspike-wave....

  10. Myoclonic encephalopathy after exposure to trichloroethylene.

    Science.gov (United States)

    Sanz, Pere; Nogué, Santiago; Vilchez, Daniel; Salvadó, Elisa; Casal, Amparo; Logroscino, Giancarlo

    2008-12-01

    Trichloroethylene is a widely-used industrial solvent that is absorbed through the digestive or respiratory tracts or cutaneously. It has a selective tropism for the cardiovascular and central nervous systems and may cause death due to cardiac arrest or neurological sequelae. We present the case of a 25-yr-old women who was exposed to trichloroethylene in the workplace for 18 months and who developed a disabling myoclonic encephalopathy. Non-toxicological causes were excluded. Although the exposure ceased, the disease progressed with thalamic and cerebellar involvement. The patient, who had only a partial response to symptomatic treatment, suffered severe limitations in the activities of daily living and was registered as permanently disabled due to a work-related disability.

  11. Association of the GRM4 gene variants with juvenile myoclonic ...

    Indian Academy of Sciences (India)

    out the genetic association study in an Indian population for ... Keywords. genetic risk factor; idiopathic generalized epilepsy; juvenile myoclonic epilepsy; metabotropic glutamate receptor; polygenic ..... JME cases, in a German population.

  12. Risky Decision Making in Juvenile Myoclonic Epilepsy

    Directory of Open Access Journals (Sweden)

    Iris Unterberger

    2018-03-01

    Full Text Available It is not known whether patients with juvenile myoclonic epilepsy (JME differ from healthy people in decision making under risk, i.e., when the decision-making context offers explicit information about options, probabilities, and consequences already from the beginning. In this study, we adopted the Game of Dice Task-Double to investigate decision making under risk in a group of 36 patients with JME (mean age 25.25/SD 5.29 years and a group of 38 healthy controls (mean age 26.03/SD 4.84 years. Participants also underwent a comprehensive neuropsychological assessment focused on frontal executive functions. Significant group differences were found in tests of psychomotor speed and divided attention, with the patients scoring lower than the controls. Importantly, patients made risky decisions more frequently than controls. In the patient group, poor decision making was associated with poor executive control, poor response inhibition, and a short interval since the last seizure episode. Executive control and response inhibition could predict 42% of variance in the frequency of risky decisions. This study indicates that patients with JME with poorer executive functions are more likely to make risky decisions than healthy controls. Decision making under risk is of major importance in every-day life, especially with regard to treatment decisions and adherence to long-term medical therapy. Since even a single disadvantageous decision may have long-lasting consequences, this finding is of high relevance.

  13. Risky Decision Making in Juvenile Myoclonic Epilepsy.

    Science.gov (United States)

    Unterberger, Iris; Zamarian, Laura; Prieschl, Manuela; Bergmann, Melanie; Walser, Gerald; Luef, Gerhard; Javor, Andrija; Ransmayr, Gerhard; Delazer, Margarete

    2018-01-01

    It is not known whether patients with juvenile myoclonic epilepsy (JME) differ from healthy people in decision making under risk, i.e., when the decision-making context offers explicit information about options, probabilities, and consequences already from the beginning. In this study, we adopted the Game of Dice Task-Double to investigate decision making under risk in a group of 36 patients with JME (mean age 25.25/SD 5.29 years) and a group of 38 healthy controls (mean age 26.03/SD 4.84 years). Participants also underwent a comprehensive neuropsychological assessment focused on frontal executive functions. Significant group differences were found in tests of psychomotor speed and divided attention, with the patients scoring lower than the controls. Importantly, patients made risky decisions more frequently than controls. In the patient group, poor decision making was associated with poor executive control, poor response inhibition, and a short interval since the last seizure episode. Executive control and response inhibition could predict 42% of variance in the frequency of risky decisions. This study indicates that patients with JME with poorer executive functions are more likely to make risky decisions than healthy controls. Decision making under risk is of major importance in every-day life, especially with regard to treatment decisions and adherence to long-term medical therapy. Since even a single disadvantageous decision may have long-lasting consequences, this finding is of high relevance.

  14. Unconsciousness, automatisms, and myoclonic jerks with diffuse rhythmic 9-Hz discharges.

    Science.gov (United States)

    Nadel, A; Waddell, G; Volow, M; Escueta, A V

    1975-09-01

    A 25-year-old man presented with seizures characterized by unconsciousness, automatic behavior, and myoclonic jerks lasting 0.5 to 8 sec. Videotape analysis of 300 simultaneously recorded electroencephalographic and clinical attacks revealed 8- to 9-Hz 150 to 200 muV sharp waves beginning in both medial temporal areas during eyelid flutters. When discharges spread diffusely on both sides and lasted 2 to 3 sec, 20 degrees forward flexion of the head, unconsciousness, pupil dilation, and staring became evident. Asymmetrical myoclonic jerks invariably appeared. When paroxysms were greater than 3 sec, automatisms and tonic posturing occurred. The electroencephalographic and clinical seizures appeared during the awake and relaxed states, i.e., with normal alpha rhythm. They were suppressed during physical and mental activities and during sleep, i.e., in the absence of alpha rhythm. Our studies suggest that these seizures associated with diffuse electroencephalographic alpha-like activities are subcortical in origin and should be tested in their responsivity to alpha suppressants and inducers.

  15. Frontal lobe epilepsy may present as myoclonic seizures.

    Science.gov (United States)

    Cho, Yong Won; Yi, Sang Doe; Motamedi, Gholam K

    2010-04-01

    We describe a patient with seizures arising from right anterior-inferior frontal lobe presenting as myoclonic epilepsy. A 19-year-old man had experienced frequent paroxysmal bilateral myoclonic jerks involving his upper arms, shoulders, neck, and upper trunk since the age of 10. His baseline EEG showed intermittent right frontal spikes, and his ictal EEG showed rhythmic sharp theta discharges in the same area. MRI revealed cortical dysplasia in the right inferior frontal gyrus, and ictal-interictal SPECT analysis by SPM showed increased signal abnormality in this region. Diffusion tensor imaging (DTI) showed defects in fasciculi in the same area. These findings suggest that frontal lobe epilepsy should be considered in some patients with myoclonic seizures. Copyright (c) 2010 Elsevier Inc. All rights reserved.

  16. Late onset myoclonic epilepsy in Down syndrome and dementia

    Directory of Open Access Journals (Sweden)

    Annapia Verri

    2012-09-01

    Full Text Available Specific forms of epilepsy may be found at various ages in Down Syndrome (DS and a sharp increase in the incidence of epilepsy with age has been documented. A specific type of myoclonic epilepsy associated with cognitive decline has been reported as “senile myoclonic epilepsy” or “late onset myoclonic epilepsy in DS” (LOMEDS. We report a new case of LOMEDS, documented by clinical and neurophysiological evaluation and psychometric assessment (DSDS and DMR. MF, male, affected by DS, was referred in 2004 at 40 years of age; he had no personal or familial history of epilepsy. Since one year, the patient presented cognitive deterioration, characterized by regression of language abilities, loss of memory, and loss of sphincters control. A brain TC showed mild brainstem and sub-cortical atrophy. In 2006, myoclonic jerks involving upper limbs occurred mainly after awakening. EEG showed a low voltage 8 Hz background activity with diffuse slow activity, intermingled with spikes or polyspikes, persisting during NREM sleep. MF was initially treated with clonazepam and after with topiramate, resulting in partial seizures control. MRI (2008 demonstrated diffuse brain atrophy, associated with marked ventricular enlargement. At the psychometric evaluation, onset of dementia was evident late in 2004, with transition to the middle stage in 2006. Last assessment (2009 showed the clinical signs of a late stage of deterioration, with loss of verbal abilities and autonomous ambulation. Using levetiracetam till 2,000 mg/die, myoclonic jerks decreased but are still present every day after awakening. On the EEG slow and poorly organized background activity with bilateral polyspike-wave discharges was recorded. Therefore, we documented a parallel progression of dementia and myoclonic epilepsy in a DS subject.

  17. Myoclonic Jerks and Schizophreniform Syndrome: Case Report and Literature Review

    Directory of Open Access Journals (Sweden)

    Dominique Endres

    2018-05-01

    Full Text Available Background: Schizophreniform syndromes can be divided into primary idiopathic forms as well as different secondary organic subgroups (e.g., paraepileptic, epileptic, immunological, or degenerative. Secondary epileptic explanatory approaches have often been discussed in the past, due to the high rates of electroencephalography (EEG alterations in patients with schizophrenia. In particular, temporal lobe epilepsy is known to be associated with schizophreniform symptoms in well-described constellations. In the literature, juvenile myoclonic epilepsy has been linked to emotionally unstable personality traits, depression, anxiety, and executive dysfunction; however, the association with schizophrenia is largely unclear.Case presentation: We present the case of a 28-year-old male student suffering from mild myoclonic jerks, mainly of the upper limbs, as well as a predominant paranoid-hallucinatory syndrome with attention deficits, problems with working memory, depressive-flat mood, reduced energy, fast stimulus satiation, delusional and audible thoughts, tactile hallucinations, thought inspirations, and severe sleep disturbances. Cerebral magnetic resonance imaging and cerebrospinal fluid analyses revealed no relevant abnormalities. The routine EEG and the first EEG after sleep deprivation (under treatment with oxazepam also returned normal findings. Video telemetry over one night, which included a partial sleep-deprivation EEG, displayed short generalized spike-wave complexes and polyspikes, associated with myoclonic jerks, after waking in the morning. Video-EEG monitoring over 5 days showed over 100 myoclonic jerks of the upper limbs, frequently with generalized spike-wave complexes with left or right accentuation. Therefore, we diagnosed juvenile myoclonic epilepsy.Discussion: This case report illustrates the importance of extended EEG diagnostics in patients with schizophreniform syndromes and myoclonic jerks. The schizophreniform symptoms in the

  18. Myoclonic Jerks and Schizophreniform Syndrome: Case Report and Literature Review.

    Science.gov (United States)

    Endres, Dominique; Altenmüller, Dirk-M; Feige, Bernd; Maier, Simon J; Nickel, Kathrin; Hellwig, Sabine; Rausch, Jördis; Ziegler, Christiane; Domschke, Katharina; Doerr, John P; Egger, Karl; Tebartz van Elst, Ludger

    2018-01-01

    Background: Schizophreniform syndromes can be divided into primary idiopathic forms as well as different secondary organic subgroups (e.g., paraepileptic, epileptic, immunological, or degenerative). Secondary epileptic explanatory approaches have often been discussed in the past, due to the high rates of electroencephalography (EEG) alterations in patients with schizophrenia. In particular, temporal lobe epilepsy is known to be associated with schizophreniform symptoms in well-described constellations. In the literature, juvenile myoclonic epilepsy has been linked to emotionally unstable personality traits, depression, anxiety, and executive dysfunction; however, the association with schizophrenia is largely unclear. Case presentation: We present the case of a 28-year-old male student suffering from mild myoclonic jerks, mainly of the upper limbs, as well as a predominant paranoid-hallucinatory syndrome with attention deficits, problems with working memory, depressive-flat mood, reduced energy, fast stimulus satiation, delusional and audible thoughts, tactile hallucinations, thought inspirations, and severe sleep disturbances. Cerebral magnetic resonance imaging and cerebrospinal fluid analyses revealed no relevant abnormalities. The routine EEG and the first EEG after sleep deprivation (under treatment with oxazepam) also returned normal findings. Video telemetry over one night, which included a partial sleep-deprivation EEG, displayed short generalized spike-wave complexes and polyspikes, associated with myoclonic jerks, after waking in the morning. Video-EEG monitoring over 5 days showed over 100 myoclonic jerks of the upper limbs, frequently with generalized spike-wave complexes with left or right accentuation. Therefore, we diagnosed juvenile myoclonic epilepsy. Discussion: This case report illustrates the importance of extended EEG diagnostics in patients with schizophreniform syndromes and myoclonic jerks. The schizophreniform symptoms in the framework of

  19. Myoclonic epilepsy with ragged-red fibers without increased lactate levels.

    Science.gov (United States)

    Kimura, Shigemi; Ozasa, Shiro; Nakamura, Kyoko; Nomura, Keiko; Kosuge, Hirofumi

    2009-07-01

    Myoclonic epilepsy associated with ragged-red fibers is one of the mitochondrial encephalomyopathies. Pathogenic mitochondrial DNA mutations have been identified in the mitochondrial transfer RNA (tRNA)(Lys) at positions 8344 and 8356. Characteristics of myoclonic epilepsy associated with ragged-red fibers include myoclonic epilepsy, generalized epilepsy, hearing loss, exercise intolerance, lactic acidosis, and ragged-red fibers. The elevated lactate level is one of the most important symptoms needed to make a diagnosis of mitochondrial encephalomyopathy. In the present case, however, myoclonic epilepsy was associated with ragged-red fibers but without increased lactate levels. Therefore, myoclonic epilepsy associated with ragged-red fibers should be suspected in a patient who has myoclonic epilepsy that is difficult to control with antiepileptic medications and who has other symptoms of mitochondrial disease, such as mental retardation, even if the patient's lactate level is normal.

  20. Hyperconnectivity in juvenile myoclonic epilepsy: A network analysis

    Directory of Open Access Journals (Sweden)

    K. Caeyenberghs, PhD

    2015-01-01

    Conclusions: Our findings suggest that structural changes in JME patients are distributed at a network level, beyond the frontal lobes. The identified subnetwork includes key structures in spike wave generation, along with primary motor areas, which may contribute to myoclonic jerks. We conclude that analyzing the affected subnetworks may provide new insights into understanding seizure generation, as well as the cognitive deficits observed in JME patients.

  1. Myoclonic epilepsy in Down syndrome and Alzheimer disease.

    Science.gov (United States)

    Aller-Alvarez, J S; Menéndez-González, M; Ribacoba-Montero, R; Salvado, M; Vega, V; Suárez-Moro, R; Sueiras, M; Toledo, M; Salas-Puig, J; Álvarez-Sabin, J

    2017-03-01

    Patients with Down syndrome (DS) who exhibit Alzheimer disease (AD) are associated with age. Both diseases with a common neuropathological basis have been associated with late-onset myoclonic epilepsy (LOMEDS). This entity presents electroencephalogram features as generalized polyspike-wave discharges. We present a series of 11 patients with the diagnosis of DS or AD who developed myoclonic seizures or generalized tonic-clonic seizures. In all cases, clinical and neuroimaging studies and polygraph EEG monitoring was performed. In all cases, cognitive impairment progressed quickly after the onset of epilepsy causing an increase in the degree of dependence. The most common finding in the EEG was a slowing of brain activity with theta and delta rhythms, plus intercritical generalized polyspike-waves were objectified in eight patients. In neuroimaging studies was found cerebral cortical atrophy. The most effective drug in this series was the levetiracetam. The association of generalized epilepsy with elderly DS represents an epiphenomenon in evolution which is associated with a progressive deterioration of cognitive and motor functions. This epilepsy has some electroclinical characteristics and behaves as progressive myoclonic epilepsy, which is probably related to the structural changes that characterize the evolutionary similarity of DS with AD. Recognition of this syndrome is important, since it has prognostic implications and requires proper treatment. Copyright © 2014 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  2. Executive functions and psychiatric symptoms in drug-refractory juvenile myoclonic epilepsy.

    Science.gov (United States)

    Walsh, Jordana; Thomas, Rhys H; Church, Carla; Rees, Mark I; Marson, Anthony G; Baker, Gus A

    2014-06-01

    The pattern of executive dysfunction reported in juvenile myoclonic epilepsy (JME) resembles that of patients with cluster B personality disorders. This study examined whether executive dysfunction and maladaptive behavior reported in patients with JME are related. Sixty patients with drug-refractory JME were administered tests of intellect, memory, and executive dysfunction. Anxiety, depression, personality traits, impact of epilepsy, and perceived cognitive effects of antiepileptic drugs were measured. Half of the cohort exhibited moderate to severe anxiety symptoms. The patients performed most poorly on naming ability and inhibition switching. Duration of epilepsy exacerbated poor performance on inhibition switching. Females presented with pathological scores for neurotic and introvert traits and males for introvert traits. Abnormal personality traits and psychiatric disorders were associated with worse intellectual and executive functioning. People with extreme Eysenck Personality Scale - Brief Version (EPQ-BV) scores demonstrated the greatest level of executive impairment. Furthermore, the same degree of dysfunction was not seen in any individual with unremarkable EPQ-BV scores. This study indicates that specific patterns of executive dysfunction are related to maladaptive behavior in JME. Distinct behavioral patterns may be used to identify functional and anatomical differences between people with JME and for stratification to enable gene discovery. Copyright © 2014. Published by Elsevier Inc.

  3. Juvenile myoclonic epilepsy and narcolepsy: A series of three cases.

    Science.gov (United States)

    Joshi, Puja Aggarwal; Poduri, Annapurna; Kothare, Sanjeev V

    2015-10-01

    This paper sets out to demonstrate the coexistence of juvenile myoclonic epilepsy (JME) and narcolepsy that raises the possibility of a shared genetic predisposition to both conditions. The electronic medical records (EMRs) were searched for narcolepsy and JME over 10years. We identified three young adult women diagnosed with JME in their teenage years, with myoclonic, generalized tonic-clonic, and absence seizure semiologies, along with psychiatric comorbidity, well managed on lamotrigine and/or levetiracetam. Our patients were also found to have disturbed sleep preceding the diagnosis of JME by many years, including excessive daytime sleepiness (EDS), fragmented nocturnal sleep, hypnagogic vivid hallucinations, and REM behavior disorder along with daytime cataplexy. They were ultimately diagnosed with coexisting narcolepsy, confirmed by sleep studies and multiple sleep latency testing, along with positive genetic testing for HLA-DQB1*0602 in all three patients. Stimulants, selective serotonin receptor inhibitors, and/or sodium oxybate were used to successfully treat their narcolepsy. The coexistence of JME and narcolepsy has not been well recognized and may be clinically relevant. In addition, it raises the possibility of a shared genetic predisposition to both conditions. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Hyperconnectivity in juvenile myoclonic epilepsy: a network analysis.

    Science.gov (United States)

    Caeyenberghs, K; Powell, H W R; Thomas, R H; Brindley, L; Church, C; Evans, J; Muthukumaraswamy, S D; Jones, D K; Hamandi, K

    2015-01-01

    Juvenile myoclonic epilepsy (JME) is a common idiopathic (genetic) generalized epilepsy (IGE) syndrome characterized by impairments in executive and cognitive control, affecting independent living and psychosocial functioning. There is a growing consensus that JME is associated with abnormal function of diffuse brain networks, typically affecting frontal and fronto-thalamic areas. Using diffusion MRI and a graph theoretical analysis, we examined bivariate (network-based statistic) and multivariate (global and local) properties of structural brain networks in patients with JME (N = 34) and matched controls. Neuropsychological assessment was performed in a subgroup of 14 patients. Neuropsychometry revealed impaired visual memory and naming in JME patients despite a normal full scale IQ (mean = 98.6). Both JME patients and controls exhibited a small world topology in their white matter networks, with no significant differences in the global multivariate network properties between the groups. The network-based statistic approach identified one subnetwork of hyperconnectivity in the JME group, involving primary motor, parietal and subcortical regions. Finally, there was a significant positive correlation in structural connectivity with cognitive task performance. Our findings suggest that structural changes in JME patients are distributed at a network level, beyond the frontal lobes. The identified subnetwork includes key structures in spike wave generation, along with primary motor areas, which may contribute to myoclonic jerks. We conclude that analyzing the affected subnetworks may provide new insights into understanding seizure generation, as well as the cognitive deficits observed in JME patients.

  5. Reduced ceramide synthase 2 activity causes progressive myoclonic epilepsy

    DEFF Research Database (Denmark)

    Mosbech, Mai-Britt; Olsen, Anne S B; Neess, Ditte

    2014-01-01

    between genes involved in SL metabolism and epilepsy. METHODS: We used quantitative real-time PCR, Western blotting, and enzymatic assays to determine the mRNA, protein, and activity levels of ceramide synthase 2 (CERS2) in fiibroblasts isolated from parental control subjects and from a patient diagnosed...... with progressive myoclonic epilepsy (PME). Mass spectrometry and fluorescence microscopy were used to examine the effects of reduced CERS2 activity on cellular lipid composition and plasma membrane functions. RESULTS: We identify a novel 27 kb heterozygous deletion including the CERS2 gene in a proband diagnosed...... with PME. Compared to parental controls, levels of CERS2 mRNA, protein, and activity were reduced by ˜50% in fibroblasts isolated from this proband, resulting in significantly reduced levels of ceramides and sphingomyelins containing the very long-chain fatty acids C24:0 and C26:0. The change in SL...

  6. Juvenile myoclonic epilepsy as a spectrum disorder: A focused review.

    Science.gov (United States)

    Baykan, Betül; Wolf, Peter

    2017-07-01

    In consequence of newer research juvenile myoclonic epilepsy (JME) is no longer seen as a homogeneous disease. The causes of the existing variance are only partially known yet. We discuss to what extent the phenotypical spectrum of this polygenetically determined disorder expresses genetically defined endophenotypes, or is due to mere quantitative differences in the expression of the core phenotype. Of the three common seizure types of JME, myoclonic, generalized tonic-clonic and absences, absences also occur independently and are strong candidates for an endophenotype. Focal features may in some patients be seen in clinical seizures or the EEG but rarely in both. They have no morphological correlates. In a system epilepsy, local manifestations are possible, and some are due to reflex mechanisms. Of the four reflex epileptic traits common in JME, photosensitivity and praxis induction appear related to basic mechanisms of the core syndrome, whereas language-induced orofacial reflex myocloni and eye closure sensitivity are also seen in other clinical contexts and therefore seem to represent endophenotypes. Cognitive abnormalities indicating slight frontal lobe dysfunction seem to be ubiquitous in JME and are also seen in unaffected siblings of patients. Cluster B personality disorder is found in 1/3 of patients, representing a more severe expression of the underlying pathology. Treatment response and prognosis seem to be affected by an interplay of the described factors producing the severest end of the JME spectrum. The spectrum appears to be due to an interaction of stronger or weaker expression of the core phenotype with various endophenotypes. Copyright © 2017 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  7. Asthma Exacerbation in Children: A Practical Review

    Directory of Open Access Journals (Sweden)

    Lin-Shien Fu

    2014-04-01

    Full Text Available Asthma is the most common chronic lower respiratory tract disease in childhood throughout the world. Despite advances in asthma management, acute exacerbations continue to be a major problem in patients and they result in a considerable burden on direct/indirect health care providers. A severe exacerbation occurring within 1 year is an independent risk factor. Respiratory tract viruses have emerged as the most frequent triggers of exacerbations in children. It is becoming increasingly clear that interactions may exist between viruses and other triggers, increasing the likelihood of an exacerbation. In this study, we provide an overview of current knowledge about asthma exacerbations, including its definition, impact on health care providers, and associated factors. Prevention management in intermittent asthma as well as intermittent wheeze in pre-school children and those with persistent asthma are discussed. Our review findings support the importance of controlling persistent asthma, as indicated in current guidelines. In addition, we found that early episodic intervention appeared to be crucial in preventing severe attacks and future exacerbations. Besides the use of medication, timely education after an exacerbation along with a comprehensive plan in follow up is also vitally important.

  8. Juvenile Myoclonic Epilepsy In India : Some Interesting Observations

    Directory of Open Access Journals (Sweden)

    Jha Sanjeev

    2004-01-01

    Full Text Available Material and Method: Study was conducted in 132 cases of JME. They were selected after screening 1210 patients presenting with syndrome of generalized seizures in age group 10-36 years. Diagnosis was established clinically by standard criterias and confirmed by EEG. Duration of study was 9 years. Results : We observed JME is under diagnosed since majority (27% were referred as uncontrolled seizures. Other patients were referred as Lenox Gestaut syndrome (19%, progressive myoclonic epilepsy (7.5% or subacute sclerosing pan-encephalitis (3.7%. There were 25 (15.5% fresh cases of JME who reported directly. We observed few atypical features in our study. They were in the form of (a wide range in age of onset (b gross delay in diagnosis (90%-lack of clinical suspicion and non-use of activation procedures in EEG appear to be important reasons for this delay (c negative family history (90% (d mild cognitive impairment (14% and (e good clinical response to other drugs viz; clobazam, phenytoin (PHT and carbamazepine (CBZ besides sodium valproate (VPA or clonazepam (CLO. However phenobarbitone (PB was ineffective. Sequential EEG became normal in 63% patients controlled on VPA while it was persistently abnormal in all patients who were well controlled on other drugs. Conclusion : Clinical spectrum of JME appears to be different in India. We suggest that it should be strongly suspected in juvenile patients of generalized epilepsy not responding to treatment.

  9. Progressive myoclonic epilepsies: definitive and still undetermined causes.

    Science.gov (United States)

    Franceschetti, Silvana; Michelucci, Roberto; Canafoglia, Laura; Striano, Pasquale; Gambardella, Antonio; Magaudda, Adriana; Tinuper, Paolo; La Neve, Angela; Ferlazzo, Edoardo; Gobbi, Giuseppe; Giallonardo, Anna Teresa; Capovilla, Giuseppe; Visani, Elisa; Panzica, Ferruccio; Avanzini, Giuliano; Tassinari, Carlo Alberto; Bianchi, Amedeo; Zara, Federico

    2014-02-04

    To define the clinical spectrum and etiology of progressive myoclonic epilepsies (PMEs) in Italy using a database developed by the Genetics Commission of the Italian League against Epilepsy. We collected clinical and laboratory data from patients referred to 25 Italian epilepsy centers regardless of whether a positive causative factor was identified. PMEs of undetermined origins were grouped using 2-step cluster analysis. We collected clinical data from 204 patients, including 77 with a diagnosis of Unverricht-Lundborg disease and 37 with a diagnosis of Lafora body disease; 31 patients had PMEs due to rarer genetic causes, mainly neuronal ceroid lipofuscinoses. Two more patients had celiac disease. Despite extensive investigation, we found no definitive etiology for 57 patients. Cluster analysis indicated that these patients could be grouped into 2 clusters defined by age at disease onset, age at myoclonus onset, previous psychomotor delay, seizure characteristics, photosensitivity, associated signs other than those included in the cardinal definition of PME, and pathologic MRI findings. Information concerning the distribution of different genetic causes of PMEs may provide a framework for an updated diagnostic workup. Phenotypes of the patients with PME of undetermined cause varied widely. The presence of separate clusters suggests that novel forms of PME are yet to be clinically and genetically characterized.

  10. CLINICAL AND ELECTROENCEPHALOGRAPHIC CHANGES IN JUVENILE MYOCLONIC EPILEPSY (A LECTURE

    Directory of Open Access Journals (Sweden)

    K. Yu. Mukhin

    2014-01-01

    Full Text Available Juvenile myoclonic epilepsy (JME is a form of idiopathic generalized epilepsy characterized by adolescent onset with massive myoclonicseizures and, in most cases, convulsive seizures occurring mainly on awakening. According to the Proposed Diagnostic Schema for Peoplewith Epileptic Seizures and with Epilepsy (2001, JME is classified into a group of idiopathic generalized epilepsy with a variable phenotype. The authors give the genetic bases of the disease, describe its clinical picture in detail, including the atypical course of JME, and consider diagnostic criteria, approaches to patient management, and principles of medical therapy. By taking into account the most common precipitating factors, along with drug therapy, the sleep and wake regimen must be strictly adhered to and household photo stimulation be avoided. Complete medical remission is achieved in about 90 % of patients (on correctly chosen therapy, in most cases on monotherapy. However, the problem resides in high recurrence rates after withdrawal of antiepileptic drugs. The major predictors of increased risk for a recurrence aftertherapy discontinuation are considered.

  11. SLC6A1 Mutation and Ketogenic Diet in Epilepsy With Myoclonic-Atonic Seizures.

    Science.gov (United States)

    Palmer, Samantha; Towne, Meghan C; Pearl, Phillip L; Pelletier, Renee C; Genetti, Casie A; Shi, Jiahai; Beggs, Alan H; Agrawal, Pankaj B; Brownstein, Catherine A

    2016-11-01

    Epilepsy with myoclonic-atonic seizures, also known as myoclonic-astatic epilepsy or Doose syndrome, has been recently linked to variants in the SLC6A1 gene. Epilepsy with myoclonic-atonic seizures is often refractory to antiepileptic drugs, and the ketogenic diet is known for treating medically intractable seizures, although the mechanism of action is largely unknown. We report a novel SLC6A1 variant in a patient with epilepsy with myoclonic-atonic seizures, analyze its effects, and suggest a mechanism of action for the ketogenic diet. We describe a ten-year-old girl with epilepsy with myoclonic-atonic seizures and a de novo SLC6A1 mutation who responded well to the ketogenic diet. She carried a c.491G>A mutation predicted to cause p.Cys164Tyr amino acid change, which was identified using whole exome sequencing and confirmed by Sanger sequencing. High-resolution structural modeling was used to analyze the likely effects of the mutation. The SLC6A1 gene encodes a transporter that removes gamma-aminobutyric acid from the synaptic cleft. Mutations in SLC6A1 are known to disrupt the gamma-aminobutyric acid transporter protein 1, affecting gamma-aminobutyric acid levels and causing seizures. The p.Cys164Tyr variant found in our study has not been previously reported, expanding on the variants linked to epilepsy with myoclonic-atonic seizures. A 10-year-old girl with a novel SLC6A1 mutation and epilepsy with myoclonic-atonic seizures had an excellent clinical response to the ketogenic diet. An effect of the diet on gamma-aminobutyric acid reuptake mediated by gamma-aminobutyric acid transporter protein 1 is suggested. A personalized approach to epilepsy with myoclonic-atonic seizures patients carrying SLC6A1 mutation and a relationship between epilepsy with myoclonic-atonic seizures due to SLC6A1 mutations, GABAergic drugs, and the ketogenic diet warrants further exploration. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. The ketogenic diet in two paediatric patients with refractory myoclonic status epilepticus.

    Science.gov (United States)

    Caraballo, Roberto Horacio; Valenzuela, Gabriela Reyes; Armeno, Marisa; Fortini, Sebastian; Mestre, Graciela; Cresta, Araceli

    2015-12-01

    We describe two patients with refractory myoclonic status epilepticus treated with the ketogenic diet. Between May 1, 2014 and January 1, 2015, two patients who met the diagnostic criteria for refractory myoclonic status epilepticus, seen at our department, were placed on the ketogenic diet and followed for a minimum of six months. One patient with myoclonic epilepsy of unknown aetiology had a 75-90% seizure reduction, and the other with progressive encephalopathy associated with myoclonic epilepsy had a 50% seizure reduction. Both patients retained good tolerability for the diet. At the last control, one patient had isolated myoclonias and EEG showed occasional generalized spike-and-polyspike waves; the patient is now successfully attending kindergarten. The quality of life of the second patient improved significantly. In both cases, the number of antiepileptic drugs was reduced. The ketogenic diet is an effective and well-tolerated treatment option for patients with refractory myoclonic status epilepticus and should be considered earlier in the course of treatment.

  13. Prevention of COPD exacerbations

    DEFF Research Database (Denmark)

    Vestbo, Jørgen; Lange, Peter

    2015-01-01

    Exacerbations have significant impact on the morbidity and mortality of patients with chronic obstructive pulmonary disease. Most guidelines emphasise prevention of exacerbations by treatment with long-acting bronchodilators and/or anti-inflammatory drugs. Whereas most of this treatment is eviden...

  14. Dextromethorphan in the treatment of early myoclonic encephalopathy evolving into migrating partial seizures in infancy

    Directory of Open Access Journals (Sweden)

    Yin-Hsuan Chien

    2012-05-01

    Full Text Available Epileptic encephalopathy with suppression-burst in electroencephalography (EEG can evolve into a few types of epileptic syndromes. We present here an unusual case of early myoclonic encephalopathy that evolved into migrating partial seizures in infancy. A female neonate initially had erratic myoclonus movements, hiccups, and a suppression-burst pattern in EEG that was compatible with early myoclonic encephalopathy. The seizures were controlled with dextromethorphan (20 mg/kg, and a suppression-burst pattern in EEG was reverted to relatively normal background activity. However, at 72 days of age, alternating focal tonic seizures, compatible with migrating partial seizures in infancy, were demonstrated by the 24-hour EEG recording. The seizures responded poorly to dextromethorphan. To our knowledge, this is the first reported case of early myoclonic encephalopathy evolving into migrating partial seizure in infancy. Whether it represents another age-dependent epilepsy evolution needs more clinical observation.

  15. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  16. Acute exacerbation of COPD.

    Science.gov (United States)

    Ko, Fanny W; Chan, Ka Pang; Hui, David S; Goddard, John R; Shaw, Janet G; Reid, David W; Yang, Ian A

    2016-10-01

    The literature of acute exacerbation of chronic obstructive pulmonary disease (COPD) is fast expanding. This review focuses on several aspects of acute exacerbation of COPD (AECOPD) including epidemiology, diagnosis and management. COPD poses a major health and economic burden in the Asia-Pacific region, as it does worldwide. Triggering factors of AECOPD include infectious (bacteria and viruses) and environmental (air pollution and meteorological effect) factors. Disruption in the dynamic balance between the 'pathogens' (viral and bacterial) and the normal bacterial communities that constitute the lung microbiome likely contributes to the risk of exacerbations. The diagnostic approach to AECOPD varies based on the clinical setting and severity of the exacerbation. After history and examination, a number of investigations may be useful, including oximetry, sputum culture, chest X-ray and blood tests for inflammatory markers. Arterial blood gases should be considered in severe exacerbations, to characterize respiratory failure. Depending on the severity, the acute management of AECOPD involves use of bronchodilators, steroids, antibiotics, oxygen and noninvasive ventilation. Hospitalization may be required, for severe exacerbations. Nonpharmacological interventions including disease-specific self-management, pulmonary rehabilitation, early medical follow-up, home visits by respiratory health workers, integrated programmes and telehealth-assisted hospital at home have been studied during hospitalization and shortly after discharge in patients who have had a recent AECOPD. Pharmacological approaches to reducing risk of future exacerbations include long-acting bronchodilators, inhaled steroids, mucolytics, vaccinations and long-term macrolides. Further studies are needed to assess the cost-effectiveness of these interventions in preventing COPD exacerbations. © 2016 Asian Pacific Society of Respirology.

  17. Prognosis of juvenile myoclonic epilepsy is related to endophenotypes.

    Science.gov (United States)

    Guaranha, Mirian S B; Filho, Gerardo M de Araújo; Lin, Kátia; Guilhoto, Laura M F F; Caboclo, Luis Otávio S F; Yacubian, Elza Márcia T

    2011-01-01

    To investigate if phenotypic variations have prognostic implications in juvenile myoclonic epilepsy (JME). Sixty-five consecutive JME patients had video-EEG recording and were followed for at least three years. Reflex traits were defined as seizures and/or EEG discharges induction by eye-closure, photic stimulation, language, praxis or calculation. Patients had psychiatric evaluation and answered to STAI (State-Trait Anxiety Inventory). Seizure control was classified according to Prasad et al. (2003).(24) Patients were divided into Group 1: good seizure control and Group 2: moderate or poor seizure control. Video-EEG/EEG evaluation was repeated in 21 patients. Forty of 65 (61.5%) patients reached good seizure control, 25 (38.5%) of whom became seizure free. Group 2 patients had longer epilepsy duration (13.9±9.0 vs. 8.7±8.2; p=0.019); higher prevalence of the combination of all three seizure types (72.0% vs. 30.0%; p=0.003); discharges in baseline EEG (56.0% vs. 22.5%; p=0.008); seizure recording (68% vs. 20%; p<0.001) and sensitivity to praxis (63.6% vs. 29.6%; p=0.023). Compared to seizure-free patients, those with persistent seizures presented younger age at epilepsy onset (12.6±3.33 years vs. 15.4±5.47 years; p=0.015); higher prevalence of personality disorders (25% vs. 4%; p=0.029); higher scores in STAI-T (45.9±11.31 vs. 36.6±11.43; p=0.011) and higher incidence of sensitivity to praxis (58.6% vs. 25.0%; p=0.04) and to language (53.8 vs. 16.7%; p=0.026) tasks. Repetition of EEG/video-EEG revealed a parallel evolution of reflex traits disappearance and seizure control. Clinical features and reflex traits have prognosis implications in JME. Copyright © 2010 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  18. Widespread cortical morphologic changes in juvenile myoclonic epilepsy: evidence from structural MRI.

    LENUS (Irish Health Repository)

    Ronan, Lisa

    2012-04-01

    Atypical morphology of the surface of the cerebral cortex may be related to abnormal cortical folding (gyrification) and therefore may indicate underlying malformations of cortical development (MCDs). Using magnetic resonance imaging (MRI)-based analysis, we examined cortical morphology in patients with juvenile myoclonic epilepsy (JME).

  19. Epilepsy with myoclonic absences - favourable response to add-on rufinamide treatment in 3 cases

    DEFF Research Database (Denmark)

    Häusler, M; Kluger, G; Nikanorova, M

    2011-01-01

    Epilepsy with myoclonic absences (EMA) is a rare epileptic syndrome with frequently poor response to antiepileptic treatment. Rufinamide (RUF) is a relatively new EMEA- and FDA-approved anticonvulsant licensed as an orphan drug for the adjunctive treatment of patients with Lennox-Gastaut syndrome....

  20. Cognitive functions in myoclonic epilepsy with ragged red fibres – a case report

    Directory of Open Access Journals (Sweden)

    Domańska Martyna

    2015-06-01

    Full Text Available Introduction. Myoclonic epilepsy with ragged red fibers (MERRF is a rare, progressive mitochondrial disease affecting multiple systems, including the central nervous system. Typical MERRF symptoms include: myoclonus, epileptic seizures, ataxia and cognitive decline. In mitochondrial diseases selective cognitive impairment or generalized decline, called mitochondrial dementia, is usually diagnosed.

  1. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  2. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  3. Familial Cortical Myoclonic Tremor and Epilepsy, an Enigmatic Disorder: From Phenotypes to Pathophysiology and Genetics. A Systematic Review

    NARCIS (Netherlands)

    van den Ende, Tom; Sharifi, Sarvi; van der Salm, Sandra M. A.; van Rootselaar, Anne-Fleur

    2018-01-01

    Autosomal dominant familial cortical myoclonic tremor and epilepsy (FCMTE) is characterized by distal tremulous myoclonus, generalized seizures, and signs of cortical reflex myoclonus. FCMTE has been described in over 100 pedigrees worldwide, under several different names and acronyms. Pathological

  4. Modulation of epileptiform EEG discharges in juvenile myoclonic epilepsy: An investigation of reflex epileptic traits

    DEFF Research Database (Denmark)

    Beniczky, Sándor; Guaranha, Mirian Salvadori Bittar; Conradsen, Isa

    2012-01-01

    Purpose: Previous studies have suggested that cognitive tasks modulate (provoke or inhibit) the epileptiform electroencephalography (EEG) discharges (EDs) in patients with juvenile myoclonic epilepsy (JME). Their inhibitory effect was found to be especially frequent (64–90%). These studies...... arbitrarily defined modulation as a >100% increase or >50% decrease of the EDs compared with baseline, which may not sufficiently distinguish from spontaneous fluctuations. The aim of our study was to assess the modulation of EDs and the precipitation of myoclonic seizures by cognitive tasks...... and by conventional provocation methods, taking into account also the spontaneous fluctuation of EDs. Method: Sixty patients with JME underwent video‐EEG recordings including 50‐min baseline, sleep, hyperventilation, intermittent photic stimulation (IPS), and cognitive tasks. To account for spontaneous fluctuations...

  5. Dark chocolate exacerbates acne.

    Science.gov (United States)

    Vongraviopap, Saivaree; Asawanonda, Pravit

    2016-05-01

    The effects of chocolate on acne exacerbations have recently been reevaluated. For so many years, it was thought that it had no role in worsening acne. To investigate whether 99% dark chocolate, when consumed in regular daily amounts, would cause acne to worsen in acne-prone male subjects, twenty-five acne prone male subjects were asked to consume 25 g of 99% dark chocolate daily for 4 weeks. Assessments which included Leeds revised acne scores as well as lesion counts took place weekly. Food frequency questionnaire was used, and daily activities were recorded. Statistically significant changes of acne scores and numbers of comedones and inflammatory papules were detected as early as 2 weeks into the study. At 4 weeks, the changes remained statistically significant compared to baseline. Dark chocolate when consumed in normal amounts for 4 weeks can exacerbate acne in male subjects with acne-prone skin. © 2015 The International Society of Dermatology.

  6. Interictal mood and personality disorders in temporal lobe epilepsy and juvenile myoclonic epilepsy.

    Science.gov (United States)

    Perini, G I; Tosin, C; Carraro, C; Bernasconi, G; Canevini, M P; Canger, R; Pellegrini, A; Testa, G

    1996-01-01

    BACKGROUND: Mood disorders have been described as the commonest psychiatric disorders in patients with temporal lobe epilepsy. Secondary depression in temporal lobe epilepsy could be interpreted either as an adjustment reaction to a chronic disease or as a limbic dysfunction. To clarify this issue, a controlled study of psychiatric disorders was conducted in different forms of epileptic and non-epileptic chronic conditions. METHODS: Twenty outpatients with temporal lobe epilepsy, 18 outpatients with juvenile myoclonic epilepsy--a primary generalised seizure disorder--20 matched type I diabetic patients, and 20 matched normal controls were assessed by a structured interview (SADS) and by self rating scales (Beck depression inventory (BDI) and the state and trait anxiety scales STAIX1 and STAIX2). RESULTS: Sixteen (80%) patients with temporal lobe epilepsy fulfilled the criteria for a psychiatric diagnosis at the SADS interview with a significantly higher frequency than patients with juvenile myoclonic epilepsy (22%) and diabetic patients (10%) (P personality or anxiety disorder. Patients with temporal lobe epilepsy scored significantly higher on BDI, STAIX1, and STAIX2 than the three control groups (P personality disorders, often in comorbidity, than patients with juvenile myoclonic epilepsy and diabetic patients suggesting that these psychiatric disorders are not an adjustment reaction to a chronic disease but rather reflect a limbic dysfunction. PMID:8971108

  7. Impact of exacerbations on COPD

    Directory of Open Access Journals (Sweden)

    A. Anzueto

    2010-06-01

    Full Text Available Exacerbations of chronic obstructive pulmonary disease (COPD determine disease-associated morbidity, mortality, resource burden and healthcare costs. Acute exacerbation care requirements range from unscheduled primary care visits to emergency room, inpatient or intensive care, generating significant costs in COPD. Even after an exacerbation resolves, respiratory, physical, social and emotional impairment may persist for prolonged time. Frequent exacerbations, mainly in patients with severe COPD, accelerate disease progression and mortality. Thus, patients with frequent exacerbations have a more rapid decline in lung function, worse quality of life and decreased exercise performance. Management of COPD directed to reduce incidence and severity of exacerbations improves long-term health status and conserves health care resources and costs.

  8. Exacerbations of asthma - A descriptive study of 425 severe exacerbations

    NARCIS (Netherlands)

    Tattersfield, AE; Postma, DS; Barnes, PJ; Svensson, K; Bauer, CA; O'Byrne, PM; Lofdahl, CG; Pauwels, RA; Ullman, A

    The identification, prevention, and prompt treatment of exacerbations are major objectives of asthma management. We looked at change in PEF, symptoms, and use of rescue p-agonists during the 425 severe exacerbations that occurred during a 12-mo parallel group study (FACET) in which low and high

  9. Graduated clinical manifestations according to mutation type in patients with severe myoclonic epilepsy in infancy

    DEFF Research Database (Denmark)

    Brusgaard, Klaus; Møller, Rikke Steensbjerre; Dahl, Hans Atli

    . Later, patients also manifest other seizure types, including absence, myoclonic, and simple and complex partial seizures. Psychomotor development stagnates around the second year of life. SME is considered to be the most severe phenotype within the spectrum of GEFS+. SME is a malignant epileptic...... and intractable childhood epilepsy with generalized tonic-clonic seizures (ICE-GTC) at the severe end Patients and methods 87 infants representing GEFS+ were analyzed by bidirectional sequencing of all exons of the SCN1A, SCN2A, GABRG2 or SCN1B genes. Additionally, MLPA analysis of SCN1A was performed. Results...... to the SMEI phenotype represent de novo incidences....

  10. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  11. Nebulized corticosteroids in the management of acute exacerbation of COPD

    Directory of Open Access Journals (Sweden)

    Gaude G

    2010-01-01

    Full Text Available Acute exacerbations in chronic onstructive pulmonary disease (COPD are common and systemic steroids play an important role in the management of these cases along with the bronchodilators. Nebulized budesonide is being used in the acute attacks of bronchial asthma either in children or in adults. But the role of nebulized steroids in acute exacerbation of COPD is not much studied in the literature. In this clinical review we have evaluated the role of nebulized corticosteroids in the management of acute exacerbation of COPD (AECOPD. Through Medline, Pubmed and Embase we analyzed the various studies that has been done to study the role of nebulized corticosteroids in the management of acute exacerbation of COPD. The key words used for the search criteria were: acute exacerbation, COPD, nebulized corticosteroids, budesonide, fluticasone. Only eight studies were found which had evaluated the role of nebulized corticosteroids in acute exacerbations of COPD. All these studies had used nebulized budesonide in AECOPD in different dosages, and had been compared with both either parental or oral steroids, and standard bronchodilator therapy. All the studies had found the clinical efficacy of nebulized budesonide to be of similar extent to that of either parental or oral steroids in AECOPD. Side effects profile of nebulized budesonide was minimal and acceptable as compared to systemic steroids. Nebulized budesonide may be an alternative to parental/oral prednisolone in the treatment of acute exacerbations of COPD but further studies should be done to evaluate its long-term impact on clinical outcomes after an initial episode of COPD exacerbation.

  12. Exacerbations of asthma during pregnancy

    DEFF Research Database (Denmark)

    Ali, Z; Hansen, A V; Ulrik, C S

    2016-01-01

    Asthma is common among pregnant women, and the incidence of asthma exacerbations during pregnancy is high. This literature review provides an overview of the impact of exacerbations of asthma during pregnancy on pregnancy-related complications. The majority of published retrospective studies reveal...... that asthma exacerbations during pregnancy increase the risk of pre-eclampsia, gestational diabetes, placental abruption and placenta praevia. Furthermore, these women also have higher risk for breech presentation, haemorrhage, pulmonary embolism, caesarean delivery, maternal admission to the intensive care...... to these outcomes. In conclusion, asthma exacerbations during pregnancy are associated with complications of pregnancy, labour and delivery. Prevention of exacerbations is essential to reduce the risk of complications and poor outcome....

  13. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Familial Cortical Myoclonic Tremor with Epilepsy and Cerebellar Changes: Description of a New Pathology Case and Review of the Literature

    Directory of Open Access Journals (Sweden)

    Sarvi Sharifi

    2012-08-01

    Full Text Available Background: Over 60 Asian and European families with cortical myoclonic tremor and epilepsy have been reported under various names. Cerebellar changes may be part of the syndrome. In this study, we report the neuropathology findings in a new Dutch familial cortical myoclonic tremor with epilepsy case and review the literature on this syndrome.Methods: Neuropathological investigations were performed for a third case of the Dutch pedigree. In addition, we searched the literature for pedigrees meeting the criteria for benign familial myoclonic tremor and epilepsy.Results: Our third Dutch case showed cerebellar Purkinje cell changes and a normal cerebral cortex. The pedigrees described show phenotypical differences, cerebellar symptoms and cerebellar atrophy to a variable degree. Japanese pedigrees with linkage to chromosome 8q have been reported with milder disease features than members of Italian pedigrees with linkage to chromosome 2p. French pedigrees (5p possibly show even more severe and progressive disease, including cognitive changes and cerebellar features.Discussion: Currently, familial cortical myoclonic tremor is not listed by the International League Against Epilepsy, although it can be differentiated from other epileptic syndromes. Genetic heterogeneity and phenotypical differences between pedigrees exist. Cerebellar changes seem to be part of the syndrome in at least a number of pedigrees.

  15. Mutations in the GABA Transporter SLC6A1 Cause Epilepsy with Myoclonic-Atonic Seizures

    Science.gov (United States)

    Carvill, Gemma L.; McMahon, Jacinta M.; Schneider, Amy; Zemel, Matthew; Myers, Candace T.; Saykally, Julia; Nguyen, John; Robbiano, Angela; Zara, Federico; Specchio, Nicola; Mecarelli, Oriano; Smith, Robert L.; Leventer, Richard J.; Møller, Rikke S.; Nikanorova, Marina; Dimova, Petia; Jordanova, Albena; Petrou, Steven; Helbig, Ingo; Striano, Pasquale; Weckhuysen, Sarah; Berkovic, Samuel F.; Scheffer, Ingrid E.; Mefford, Heather C.

    2015-01-01

    GAT-1, encoded by SLC6A1, is one of the major gamma-aminobutyric acid (GABA) transporters in the brain and is responsible for re-uptake of GABA from the synapse. In this study, targeted resequencing of 644 individuals with epileptic encephalopathies led to the identification of six SLC6A1 mutations in seven individuals, all of whom have epilepsy with myoclonic-atonic seizures (MAE). We describe two truncations and four missense alterations, all of which most likely lead to loss of function of GAT-1 and thus reduced GABA re-uptake from the synapse. These individuals share many of the electrophysiological properties of Gat1-deficient mice, including spontaneous spike-wave discharges. Overall, pathogenic mutations occurred in 6/160 individuals with MAE, accounting for ∼4% of unsolved MAE cases. PMID:25865495

  16. Opercular myoclonic-anarthric status epilepticus: A report of two cases

    Directory of Open Access Journals (Sweden)

    Janapareddy Vijaya Bhaskara Rao

    2013-01-01

    Full Text Available Opercular myoclonic-anarthric status epilepticus (OMASE is an uncommon disorder of diverse etiology. This condition is characterized by fluctuating cortical dysarthria associated with epileptic myoclonus involving glossopharyngeal musculature bilaterally. We report two cases of OMASE of vascular etiology in adults. In both patients, ictally clonic expression was consistent with epilepsia partialis continua and bilateral, symmetrical involvement of soft palate in one patient and tongue, lips, chin and inferior jaw in both patients due to bilateral projections of the inferior corticonuclear pathways. The inferior rolandic area of dominant and high frontal region in non-dominant hemispheres were involved by an epileptogenic lesion of vascular etiology, which was confirmed by magnetic resonance imaging of brain and single photon emission computerized tomography. Carotid Doppler study showed thrombosis of internal carotid artery in both patients, suggestive of an embolic origin. Early recognition of OMASE is important for early management of carotid occlusive disease.

  17. Altered glucose metabolism in juvenile myoclonic epilepsy: a PET study with statistical parametric mapping

    International Nuclear Information System (INIS)

    Lim, G. C.; Kim, J. H.; Kang, J. G.; Kim, J. S.; Yeo, J. S.; Lee, S. A.; Moon, D. H

    2004-01-01

    Juvenile myoclonic epilepsy (JME) is a hereditary, age-dependent epilepsy syndrome, characterized by myoclonic jerks on awakening and generalized tonic-clonic seizures. Although there have been considerable studies on the mechanism to elucidate pathogenesis of JME, the accurate pathogenesis of JME remains obscure. The aim of this study was to investigate alterations of cerebral glucose metabolism in patients with JME. We studied 16 JME patients (Mean age: 22 yrs, M/F: 9/7) with brain FDG-PET and simultaneous EEG recording. On the basis of the number of generalized spike-and-wave (GSW) discharges on the 30 min EEG recording after the injection of FDG (370MBq), we classified patients into two groups (patients in group A had 10 or more GSW and group B. 9 or less). We applied the automated and objective technique of statistical parametric mapping (SPM) to the analysis of FDG-PET to determine the significant hyper- and hypometabolic regions compared with those of 19 age matched normal control subjects. We found significant hypermetabolic regions in bilateral thalamus and central portion of upper brainstem in 16 patients with JME at a statistical threshold of uncorrected P < 0.05. These changes were also shown in group A (n=8), but not in group B (n=8). Additionally, we found significant hypometabolism in bilateral, widespread cortical regions in 16 patients with JME at a threshold of uncorrected P < 0.01. Similar hypometabolic patterns were also observed in both group A and group B, being more prominent in group A. This study provides evidence for the key role of the thalamus and brainstem reticular activating system in generating spontaneous GSW discharge, which is considered as a fundamental pathogenesis underlying JME. This study also suggests that patients with JME might suffer from subtle abnormalities of cognitive and executive cortical functions

  18. Addition of verapamil in the treatment of severe myoclonic epilepsy in infancy.

    Science.gov (United States)

    Iannetti, Paola; Parisi, Pasquale; Spalice, Alberto; Ruggieri, Martino; Zara, Federico

    2009-07-01

    We report on the use of the voltage-gated calcium channel blocker (Vg-CCB), verapamil, as an add-on anticonvulsant medication in two girls, 4 and 14 years of age, who were affected by severe myoclonic epilepsy in infancy (SMEI) or Dravet syndrome, a channelopathy caused by abnormalities in the voltage-gated sodium channel neuronal type alpha1 subunit (SCN1A) gene at 2q24. Both girls had pharmacoresistant epilepsy and developmental delay. Mutation analysis for the SCN1A gene revealed a missense mutation in exon 2 in the 4-year-old girl. Verapamil was co-administered in both children with a prompt response in controlling status epilepticus, myoclonic jerks, and partial and generalized seizures. The therapeutic effect lasted 13 months in the 14-year-old girl, while it is still present after a 20-month follow-up period in the 4-year-old girl who, in addition, has experienced improvement in motor and language development. The verapamil vVg-CCB, which crosses the blood-brain barrier (BBB): (a) inhibits the P-glycoprotein, an active efflux transporter protein expressed in normal tissue, including the brain, which is believed to contribute to the in situ phenomenon of multidrug resistance; and (b) may regulate membrane depolarization induced by abnormal sodium channels functions by modulating the abnormal Ca++ influxes into neurons with subsequent cell resting. This is the first report on long-lasting verapamil therapy in SMEI. The functional consequences of such in vivo modulating effects on Ca++ channels could contribute to rational targeting for future molecular therapeutic approaches in pharmacoresistant epileptic channelopathies.

  19. Altered glucose metabolism in juvenile myoclonic epilepsy: a PET study with statistical parametric mapping

    Energy Technology Data Exchange (ETDEWEB)

    Lim, G. C.; Kim, J. H.; Kang, J. G.; Kim, J. S.; Yeo, J. S.; Lee, S. A.; Moon, D. H [Asan Medical Center, Seoul (Korea, Republic of)

    2004-07-01

    Juvenile myoclonic epilepsy (JME) is a hereditary, age-dependent epilepsy syndrome, characterized by myoclonic jerks on awakening and generalized tonic-clonic seizures. Although there have been considerable studies on the mechanism to elucidate pathogenesis of JME, the accurate pathogenesis of JME remains obscure. The aim of this study was to investigate alterations of cerebral glucose metabolism in patients with JME. We studied 16 JME patients (Mean age: 22 yrs, M/F: 9/7) with brain FDG-PET and simultaneous EEG recording. On the basis of the number of generalized spike-and-wave (GSW) discharges on the 30 min EEG recording after the injection of FDG (370MBq), we classified patients into two groups (patients in group A had 10 or more GSW and group B. 9 or less). We applied the automated and objective technique of statistical parametric mapping (SPM) to the analysis of FDG-PET to determine the significant hyper- and hypometabolic regions compared with those of 19 age matched normal control subjects. We found significant hypermetabolic regions in bilateral thalamus and central portion of upper brainstem in 16 patients with JME at a statistical threshold of uncorrected P < 0.05. These changes were also shown in group A (n=8), but not in group B (n=8). Additionally, we found significant hypometabolism in bilateral, widespread cortical regions in 16 patients with JME at a threshold of uncorrected P < 0.01. Similar hypometabolic patterns were also observed in both group A and group B, being more prominent in group A. This study provides evidence for the key role of the thalamus and brainstem reticular activating system in generating spontaneous GSW discharge, which is considered as a fundamental pathogenesis underlying JME. This study also suggests that patients with JME might suffer from subtle abnormalities of cognitive and executive cortical functions.

  20. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  1. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  4. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  5. Are personality traits of juvenile myoclonic epilepsy related to frontal lobe dysfunctions? A proton MRS study.

    Science.gov (United States)

    de Araújo Filho, Gerardo Maria; Lin, Katia; Lin, Jaime; Peruchi, Mirella M; Caboclo, Luís Otávio S F; Guaranha, Mirian S B; Guilhoto, Laura M F F; Carrete, Henrique; Yacubian, Elza Márcia T

    2009-05-01

    Personality traits characterized by emotional instability and immaturity, unsteadiness, lack of discipline, hedonism, frequent and rapid mood changes, and indifference toward one's disease have been associated with patients who have juvenile myoclonic epilepsy (JME). Literature data demonstrate worse seizure control and more psychosocial dysfunctions among patients with JME who have those traits. In this controlled study we performed a correlation analysis of psychiatric scores with magnetic resonance spectroscopy (MRS) values across JME patients, aiming to verify the existence of a possible relation between frontal lobe dysfunction and the prevalence of personality disorders (PDs) in JME. Sixteen JME patients with cluster B PDs, 41 JME patients without any psychiatric disorder, and 30 healthy controls were submitted to a psychiatric evaluation and to a quantitative multivoxel MRS of thalamus; insula; cingulate gyrus; striatum; and frontal, parietal, and occipital lobes. Groups were homogeneous according to age, gender, and manual dominance. Psychiatric evaluation was performed through the Scheduled Clinical Interview for DSM-IV, Axis I and II (SCID I and II, respectively). A significant reduction of N-acetyl-aspartate over creatinine (NAA/Cr) ratio was observed mainly in the left frontal lobe in the JME and PD group. In addition, a significant increase in the glutamate-glutamine over creatinine GLX/Cr ratio was also observed in this referred region in the same group. These data support the hypothesis that PDs in JME could represent neuronal dysfunction and possibly a more severe form of this epileptic syndrome.

  6. Psychiatric comorbidity in epilepsy: a study comparing patients with mesial temporal sclerosis and juvenile myoclonic epilepsy.

    Science.gov (United States)

    Filho, Gerardo Maria de Araújo; Rosa, Vivianne Pellegrino; Lin, Katia; Caboclo, Luís Otávio Sales Ferreira; Sakamoto, Américo Ceiki; Yacubian, Elza Márcia Targas

    2008-07-01

    We evaluated the frequency of psychiatric disorders (PDs) in a homogenous series of patients with temporal lobe epilepsy with mesial temporal sclerosis (TLE-MTS), as compared with patients with juvenile myoclonic epilepsy (JME), aiming to determine possible differences in psychiatric diagnoses between these two epileptic syndromes. Data from 170 patients with refractory TLE-MTS and from 100 patients with JME were reviewed and compared. The prevalence of PDs was high in both groups of patients with epilepsy: PDs were present in 85 patients with TLE-MTS (50%) and 49 patients with JME (49%). Among the TLE-MTS group, mood (25.8%), psychotic (15.8%), and anxiety (14.1%) disorders were the most frequent diagnoses, whereas anxiety and mood disorders (23 and 19%, respectively) were the most common among patients with JME. Psychoses were significantly associated with MTS (P<0.01) and anxiety disorders with JME (P<0.05). These findings suggest the existence of an anatomic correlation between PDs and brain structures involved in both epilepsy syndromes.

  7. Neuropsychological profile of patients with juvenile myoclonic epilepsy: a controlled study of 50 patients.

    Science.gov (United States)

    Pascalicchio, Tatiana Frascareli; de Araujo Filho, Gerardo M; da Silva Noffs, Maria Helena; Lin, Katia; Caboclo, Luís Otávio S F; Vidal-Dourado, Marcos; Ferreira Guilhoto, Laura M F; Yacubian, Elza Márcia Targas

    2007-03-01

    The purpose of this study was to verify possible cognitive dysfunction in patients with juvenile myoclonic epilepsy (JME) and its relationship to factors related to epilepsy and schooling. Fifty subjects diagnosed with JME and 50 controls underwent neuropsychological assessment evaluating intellectual functions, attention, memory, executive functions, and language. The patients were further divided into two subgroups on the basis of educational level: 11 years of formal education. Participants diagnosed with JME scored significantly below age-, education-, and gender-matched controls on neuropsychological measures of attention, immediate verbal memory, mental flexibility, control of inhibition, working memory, processing speed, verbal delayed memory, visual delayed memory, naming, and verbal fluency. A positive correlation was observed between duration of epilepsy and cognitive decline. However, in the group of patients with >11 years of education, this correlation was not significant. In this series of patients with JME, neuropsychological evaluation suggests widespread cognitive dysfunction outside the limits of the frontal lobes. The duration of epilepsy correlated with cognitive decline, and patients with higher education manifested less progression of deficits.

  8. Analysis of hormone-dependent pathology in female patients with juvenile myoclonic epilepsy

    Directory of Open Access Journals (Sweden)

    D. V. Anisimova

    2017-01-01

    Full Text Available Objective: to study the characteristics of manifestations of hormonal abnormalities in women with juvenile myoclonic epilepsy (JME and to comparatively analyze identified syndromes.Patients and methods. Hormonal disorders were analyzed in 48 reproductive-aged women with JME, who had received antiepileptic drug (AED mono- and bitherapy during one or more years.Results. 66.7% of the patients were found to have ovarian hormonal dysfunction manifesting itself as the development of polycystic ovary syndrome, hypogonadism, isolated hyperandrogenism, and hypoprogesteronemia. Clinically detected syndromes frequently appeared as menstrual irregularity in 29% of the patients. Comparative analysis of hormone-dependent syndromes showed that there were no differences in the clinical features of JME, but the earliest age at onset in isolated hyperandrogenism, and no patients with menstrual irregularity in the presence of isolated hypoprogesteronemia. The use of different AEDs had no impact on the incidence of hormonal abnormalities, which requires further investigation and its inclusion of a greater number of patients receiving various AEDs. 

  9. Structural Brain Abnormalities in Juvenile Myoclonic Epilepsy Patients: Volumetry and Voxel-Based Morphometry

    International Nuclear Information System (INIS)

    Tae, Woo Suk; Hong, Seung Bong; Joo, Eun Yun

    2006-01-01

    We aimed to find structural brain abnormalities in juvenile myoclonic epilepsy (JME) patients. The volumes of the cerebrum, hippocampus and frontal lobe and the area of the corpus callosum's subdivisions were all semiautomatically measured, and then optimized voxel-based morphometry (VBM) was performed in 19 JME patients and 19 age/gender matched normal controls. The rostrum and rostral body of the corpus callosum and the left hippocampus were significantly smaller than those of the normal controls, whereas the volume of the JME's left frontal lobe was significantly larger than that of the controls. The area of the rostral body had a significant positive correlation with the age of seizure onset (r=0.56, p=0.012), and the volume of the right frontal lobe had a significant negative correlation with the duration of disease (r=-0.51, p=0.025). On the VBM, the gray matter concentration of the prefrontal lobe (bilateral gyri rectus, anterior orbital gyri, left anterior middle frontal gyrus and right anterior superior frontal gyrus) was decreased in the JME group (corrected p<0.05). The JME patients showed complex structural abnormalities in the corpus callosum, frontal lobe and hippocampus, and also a decreased gray matter concentration of the prefrontal region, which all suggests there is an abnormal neural network in the JME brain

  10. Structural Brain Abnormalities in Juvenile Myoclonic Epilepsy Patients: Volumetry and Voxel-Based Morphometry

    Energy Technology Data Exchange (ETDEWEB)

    Tae, Woo Suk; Hong, Seung Bong [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of); Joo, Eun Yun [Ewha Womans University, Seoul (Korea, Republic of)

    2006-09-15

    We aimed to find structural brain abnormalities in juvenile myoclonic epilepsy (JME) patients. The volumes of the cerebrum, hippocampus and frontal lobe and the area of the corpus callosum's subdivisions were all semiautomatically measured, and then optimized voxel-based morphometry (VBM) was performed in 19 JME patients and 19 age/gender matched normal controls. The rostrum and rostral body of the corpus callosum and the left hippocampus were significantly smaller than those of the normal controls, whereas the volume of the JME's left frontal lobe was significantly larger than that of the controls. The area of the rostral body had a significant positive correlation with the age of seizure onset (r=0.56, p=0.012), and the volume of the right frontal lobe had a significant negative correlation with the duration of disease (r=-0.51, p=0.025). On the VBM, the gray matter concentration of the prefrontal lobe (bilateral gyri rectus, anterior orbital gyri, left anterior middle frontal gyrus and right anterior superior frontal gyrus) was decreased in the JME group (corrected p<0.05). The JME patients showed complex structural abnormalities in the corpus callosum, frontal lobe and hippocampus, and also a decreased gray matter concentration of the prefrontal region, which all suggests there is an abnormal neural network in the JME brain.

  11. Heterogeneity of anatomic regions by MR volumetry in juvenile myoclonic epilepsy.

    Science.gov (United States)

    Swartz, B E; Spitz, J; Vu, A L; Mandelkern, M; Su, M L

    2016-10-01

    To investigate brain volumes in patients with well-characterized juvenile myoclonic epilepsy (JME). We studied the MRI images of seventeen subjects with EEG and clinically defined JME and seventeen age- and sex-matched controls using voxel-based morphometry (VBM) and automated and manual volumetry. We found no significant group differences in the cortical volumes by automated techniques for all regions or for the whole brain. However, we found a larger pulvinar nucleus in JME using VBM with small volume correction and a larger thalamus with manual volumetry (P = 0.001; corrected two-tailed t-test). By analysing the individual subjects, we determined that considerable heterogeneity exists even in this highly selected group. Histograms of all JME and matched control regions' volumes showed more subjects with JME had smaller hippocampi and larger thalami (P < 0.05; chi-square). Subjects in whom the first seizure was absence were more likely to have smaller hippocampi than their matched control, while those without absences showed no differences (P < 0.05, chi-square). There is ample evidence for frontal cortical thalamic network changes in JME, but subcortical structural differences were more distinct in this group. Given the heterogeneity of brain volumes in the clinical population, further advancement in the field will require the examination of stringent genetically controlled populations. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. High-fat diets and seizure control in myoclonic-astatic epilepsy: a single center's experience.

    Science.gov (United States)

    Simard-Tremblay, Elisabeth; Berry, Patricia; Owens, Aaron; Cook, William Byron; Sittner, Haley R; Mazzanti, Marta; Huber, Jennifer; Warner, Molly; Shurtleff, Hillary; Saneto, Russell P

    2015-02-01

    To determine the efficacy of the Modified Atkins Diet (MAD) and Ketogenic Diet (KD) in seizure control within a population of myoclonic-astatic epilepsy (MAE) patients. This was a retrospective, single center study evaluating the seizure control by high fat diets. Seizure diaries kept by the parents performed seizure counts. All patients met the clinical criteria for MAE. Nine patients met the clinical criteria. We found that both the MAD and KD were efficacious in complete seizure control and allowed other medications to be stopped in seven patients. Two patients had greater than 90% seizure control without medications, one on the KD and the other on the MAD. Seizure freedom has ranged from 13 to 36 months, and during this time four patients have been fully weaned off of diet management. One patient was found to have a mutation in SLC2A1. Our results suggest that strictly defined MAE patients respond to the MAD with prolonged seizure control. Some patients may require the KD for seizure freedom, suggesting a common pathway of increased requirement for fats. Once controlled, those fully responsive to the Diet(s) could be weaned off traditional seizure medications and in many, subsequently off the MAD or KD. Copyright © 2014 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  13. Impact of family support on psychiatric disorders and seizure control in patients with juvenile myoclonic epilepsy.

    Science.gov (United States)

    Jayalakshmi, Sita; Padmaja, Gaddamanugu; Vooturi, Sudhindra; Bogaraju, Anand; Surath, Mohandas

    2014-08-01

    Psychiatric disorders (PDs) are frequently observed in patients with juvenile myoclonic epilepsy (JME). In this study, we aimed to assess factors associated with PDs in patients with JME. Retrospective analysis of data of 90 consecutive patients with JME was performed. Assessment of DSM-IV Axis I clinical disorders was done using Structured Clinical Interview for Axis I. Diagnosis of PDs is made when the score exceeds the threshold provided by the DSM-IV. We also applied the Global Assessment of Functioning (GAF) scale which is part of the multiaxial evaluation of the DSM-IV (Axis-V). Using seizure frequency score at presentation, we classified subjects into controlled and uncontrolled groups. In the current cohort, 29 (32.2%) patients were diagnosed with PDs. Fewer patients with PDs had family support (48.3% vs. 83.6%; p=0.001). Lifetime prevalence of PDs was higher among patients with current PDs (96.6% vs. 18.0%; pseizure control (7.8% vs. 73.1%; pseizure control. Patients with lack of family support had poor seizure control (0% vs. 36.9%; pseizure control and higher incidence of PDs in patients with JME. Lack of family support increases neither the odds of PDs nor seizure control. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Altered Structural and Functional Connectivity of Juvenile Myoclonic Epilepsy: An fMRI Study

    Directory of Open Access Journals (Sweden)

    Chengqing Zhong

    2018-01-01

    Full Text Available The aim of this study was to investigate the structural and functional connectivity (FC of juvenile myoclonic epilepsy (JME using resting state functional magnetic resonance imaging (rs-fMRI. High-resolution T1-weighted magnetic resonance imaging (MRI and rs-fMRI data were collected in 25 patients with JME and in 24 control subjects. A FC analysis was subsequently performed, with seeding at the regions that demonstrated between-group differences in gray matter volume (GMV. Then, the observed structural and FCs were associated with the clinical manifestations. The decreased GMV regions were found in the bilateral anterior cerebellum, the right orbital superior frontal gyrus, the left middle temporal gyrus, the left putamen, the right hippocampus, the bilateral caudate, and the right thalamus. The changed FCs were mainly observed in the motor-related areas and the cognitive-related areas. The significant findings of this study revealed an important role for the cerebellum in motor control and cognitive regulation in JME patients, which also have an effect on the activity of the occipital lobe. In addition, the changed FCs were related to the clinical features of JME patients. The current observations may contribute to the understanding of the pathogenesis of JME.

  15. Severe myoclonic epilepsy of infancy (Dravet syndrome: Clinical and genetic features of nine Turkish patients

    Directory of Open Access Journals (Sweden)

    Meral Özmen

    2011-01-01

    Full Text Available Purpose: Mutations of the a-1 subunit sodium channel gene (SCN1A cause severe myoclonic epilepsy of infancy (SMEI. To date, over 300 mutations related to SMEI have been described. In the present study, we report new SCN1A mutations and the clinical features of SMEI cases. Materials and Methods: We studied the clinical and genetic features of nine patients diagnosed with SMEI at the Pediatric Neurology Department of Istanbul Medical Faculty. Results: Five patients had nonsense mutations, two had missense mutations, one had a splice site mutation and one had a deletion mutation of the SCN1A gene. Mutations at c.3705+5G splice site, p.trip153X nonsense mutation and deletion at c.2416_2946 have not been previously described. The seizures started following whole cell pertussis vaccination in all patients. The seizures ceased in one patient and continued in the other eight patients. Developmental regression was severe in three patients, with frequent status epilepticus. The type of mutation was not predictive for the severity of the disease. Two of the three patients with severe regression had nonsense and missense mutations. Conclusions : Dravet syndrome can be result of several different types of mutation in SCN1A gene. Onset of the seizures after pertussis vaccination is an important clue for the diagnosis and neuro- developmental delay should be expected in all patients.

  16. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  17. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  19. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  20. Provocative and inhibitory effects of a video-EEG neuropsychologic protocol in juvenile myoclonic epilepsy.

    Science.gov (United States)

    Guaranha, Mirian Salvadori Bittar; da Silva Sousa, Patrícia; de Araújo-Filho, Gerardo Maria; Lin, Katia; Guilhoto, Laura Maria Figueiredo Ferreira; Caboclo, Luís Otávio Sales Ferreira; Yacubian, Elza Márcia Targas

    2009-11-01

    Studies suggest that higher cognitive functions could precipitate seizures in juvenile myoclonic epilepsy (JME). The present study aimed to analyze the effects of higher mental activity on epileptiform discharges and seizures in patients with JME and compare them to those of habitual methods of activation. Seventy-six patients with JME (41 female) underwent a video-EEG (electroencephalography) neuropsychologic protocol (VNPP) and habitual methods of activation for 4-6 h. Twenty-nine of the 76 (38.2%) presented provocative effect, and inhibition was seen in 28 of 31 (90.3%). A mixed effect was observed in 11 (35.5%), and 30 patients (39.5%) suffered no effect of VNPP. Action-programming tasks were more effective than thinking in provoking epileptiform discharges (23.7% and 11.0% of patients, respectively, p = 0.03). Inhibitory effect was observed equally in the various categories of tasks, except in mental calculation, which had a higher inhibitory rate. Habitual methods of activation were more effective than VNPP in provoking discharges. Anxiety disorders were diagnosed in 24 of 58 patients (41.4%); anxious patients had greater discharge indexes and no significant inhibitory effect on VNPP. Praxis exerted the most remarkable provocative effect, in accordance with the motor circuitry hyperexcitability hypothesis in JME. Inhibitory effect, which had no such task specificity, might be mediated by a widespread cortical-thalamic pathway, possibly involving the parietal cortex. The frequent inhibitory effect found under cortical activation conditions, influenced by the presence of anxiety, supports nonpharmacologic therapeutic interventions in JME.

  1. CDKL5 and ARX mutations are not responsible for early onset severe myoclonic epilepsy in infancy.

    Science.gov (United States)

    Nabbout, Rima; Depienne, Christel; Chipaux, Mathilde; Girard, Benoit; Souville, Isabelle; Trouillard, Oriane; Dulac, Olivier; Chelly, Jamel; Afenjar, Alexandra; Héron, Delphine; Leguern, Eric; Beldjord, Cherif; Bienvenu, Thierry; Bahi-Buisson, Nadia

    2009-11-01

    Severe myoclonic epilepsy of infancy (SMEI) or Dravet syndrome (DS) is a distinctive epilepsy syndrome often associated with de novo mutations in the SCN1A gene. However, 25-30% patients with SMEI/DS are negative for SCN1A mutation screening, suggesting that other molecular mechanisms may account for these disorders. Given the overlapping and heterogeneous clinical features of CDKL5- and ARX-related epilepsies and SMEI/DS, we postulated that CDKL5 mutations in females and ARX mutations gene in males may be associated with early onset seizures forms of SMEI/DS. Twenty-eight patients with early onset SMEI/DS before 6 months negative for SCN1A mutational screening were selected and screened for mutations in the ARX gene in males (n=14) or the CDKL5 gene in females (n=14). No mutations in either gene were found except one intronic variation of uncertain pathogenicity in the CDKL5 gene. All patients started seizures at mean age of 3.48 months. Thirteen patients had familial history of epilepsy or febrile seizures. Patients evolved toward refractory epilepsy with generalized tonic clonic seizures (18/28) and myoclonia (23/28) and severe neurological impairment with autistic features (13/28), ataxia (14/28) and spasticity (5/28). No patient ever exhibited infantile spasms, dystonia, or Rett-like features. Our results illustrate that mutation screening of ARX and CDKL5 is not effective in patients selected on the basis of clinical signs associated to early onset SMEI/DS. In addition, they might reflect that other phenotypic features associated with CDKL5 mutations (Rett-like features, infantile spasm) or ARX mutations (dystonia, spasticity) are more distinctive. 2009 Elsevier B.V. All rights reserved.

  2. TBC1D24, an ARF6-interacting protein, is mutated in familial infantile myoclonic epilepsy.

    Science.gov (United States)

    Falace, Antonio; Filipello, Fabia; La Padula, Veronica; Vanni, Nicola; Madia, Francesca; De Pietri Tonelli, Davide; de Falco, Fabrizio A; Striano, Pasquale; Dagna Bricarelli, Franca; Minetti, Carlo; Benfenati, Fabio; Fassio, Anna; Zara, Federico

    2010-09-10

    Idiopathic epilepsies (IEs) are a group of disorders characterized by recurrent seizures in the absence of detectable brain lesions or metabolic abnormalities. IEs include common disorders with a complex mode of inheritance and rare Mendelian traits suggesting the occurrence of several alleles with variable penetrance. We previously described a large family with a recessive form of idiopathic epilepsy, named familial infantile myoclonic epilepsy (FIME), and mapped the disease locus on chromosome 16p13.3 by linkage analysis. In the present study, we found that two compound heterozygous missense mutations (D147H and A509V) in TBC1D24, a gene of unknown function, are responsible for FIME. In situ hybridization analysis revealed that Tbc1d24 is mainly expressed at the level of the cerebral cortex and the hippocampus. By coimmunoprecipitation assay we found that TBC1D24 binds ARF6, a Ras-related family of small GTPases regulating exo-endocytosis dynamics. The main recognized function of ARF6 in the nervous system is the regulation of dendritic branching, spine formation, and axonal extension. TBC1D24 overexpression resulted in a significant increase in neurite length and arborization and the FIME mutations significantly reverted this phenotype. In this study we identified a gene mutation involved in autosomal-recessive idiopathic epilepsy, unveiled the involvement of ARF6-dependent molecular pathway in brain hyperexcitability and seizures, and confirmed the emerging role of subtle cytoarchitectural alterations in the etiology of this group of common epileptic disorders. 2010 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  3. Glycogen Phosphomonoester Distribution in Mouse Models of the Progressive Myoclonic Epilepsy, Lafora Disease*

    Science.gov (United States)

    DePaoli-Roach, Anna A.; Contreras, Christopher J.; Segvich, Dyann M.; Heiss, Christian; Ishihara, Mayumi; Azadi, Parastoo; Roach, Peter J.

    2015-01-01

    Glycogen is a branched polymer of glucose that acts as an energy reserve in many cell types. Glycogen contains trace amounts of covalent phosphate, in the range of 1 phosphate per 500–2000 glucose residues depending on the source. The function, if any, is unknown, but in at least one genetic disease, the progressive myoclonic epilepsy Lafora disease, excessive phosphorylation of glycogen has been implicated in the pathology by disturbing glycogen structure. Some 90% of Lafora cases are attributed to mutations of the EPM2A or EPM2B genes, and mice with either gene disrupted accumulate hyperphosphorylated glycogen. It is, therefore, of importance to understand the chemistry of glycogen phosphorylation. Rabbit skeletal muscle glycogen contained covalent phosphate as monoesters of C2, C3, and C6 carbons of glucose residues based on analyses of phospho-oligosaccharides by NMR. Furthermore, using a sensitive assay for glucose 6-P in hydrolysates of glycogen coupled with measurement of total phosphate, we determined the proportion of C6 phosphorylation in rabbit muscle glycogen to be ∼20%. C6 phosphorylation also accounted for ∼20% of the covalent phosphate in wild type mouse muscle glycogen. Glycogen phosphorylation in Epm2a−/− and Epm2b−/− mice was increased 8- and 4-fold compared with wild type mice, but the proportion of C6 phosphorylation remained unchanged at ∼20%. Therefore, our results suggest that C2, C3, and/or C6 phosphate could all contribute to abnormal glycogen structure or to Lafora disease. PMID:25416783

  4. Characterisation of exacerbation risk and exacerbator phenotypes in the POET-COPD trial.

    Science.gov (United States)

    Beeh, Kai M; Glaab, Thomas; Stowasser, Susanne; Schmidt, Hendrik; Fabbri, Leonardo M; Rabe, Klaus F; Vogelmeier, Claus F

    2013-10-29

    Data examining the characteristics of patients with frequent exacerbations of chronic obstructive pulmonary disease (COPD) and associated hospitalisations and mortality are scarce. Post-hoc analysis of the Prevention Of Exacerbations with Tiotropium in COPD (POET-COPD) trial, targeting exacerbations as the primary endpoint. Patients were classified as non-, infrequent, and frequent exacerbators (0, 1, or ≥ 2 exacerbations during study treatment), irrespective of study treatment. A multivariate Cox regression model assessed the effect of covariates on time to first exacerbation. In total, 7376 patients were included in the analysis: 63.5% non-exacerbators, 22.9% infrequent, 13.6% frequent exacerbators. Factors significantly associated with exacerbation risk were age, sex, body mass index, COPD duration and severity, smoking history, baseline inhaled corticosteroid use, and preceding antibiotic or systemic corticosteroid courses. Frequent exacerbators had greater severity and duration of COPD, received more pulmonary medication, and ≥ 2 systemic corticosteroid or antibiotic courses in the preceding year, and were more likely to be female and ex-smokers. The small proportion of frequent exacerbators (13.6%) accounted for 56.6% of exacerbation-related hospitalisations, which, overall, were associated with a three-fold increase in mortality. The frequent exacerbator phenotype was closely associated with exacerbation-related hospitalisations, and exacerbation-related hospitalisations were associated with poorer survival. NCT00563381; Study identifier: BI 205.389.

  5. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  6. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  7. Kleptomania and Potential Exacerbating Factors

    Science.gov (United States)

    2011-01-01

    Kleptomania is an impulse control disorder that can cause significant impairment and serious consequences. Often, the condition is kept secret by the patient, and usually help is sought only when confronted by the legal consequences of the impulsive behaviors. Historically, kleptomania has been viewed from a psychodynamic perspective, and the mainstay of treatment has been psychotherapy. Recently, attempts to explain kleptomania within a neuropsychiatric paradigm have highlighted the possible links between mood disorders, addictive behaviors, and brain injury with kleptomania. These associations with kleptomania can be extrapolated to pharmacological strategies that can potentially help in treating kleptomania. A case of kleptomania, which was potentially exacerbated by multiple factors, will be reviewed. Treatment modalities used in this case, including the use of the Yale-Brown Obsessive Compulsive Scale as a surrogate marker to gauge response to treatment, will be discussed. PMID:22132369

  8. Occipital epilepsy versus progressive myoclonic epilepsy in a patient with continuous occipital spikes and photosensitivity in electroencephalogram: A case report.

    Science.gov (United States)

    Lv, Yudan; Zhang, Nan; Liu, Chang; Shi, Mingchao; Sun, Li

    2018-04-01

    Progressive myoclonic epilepsy (PME) is rare epilepsy syndrome. Although EEG is a useful neurophysiological technique in the evaluation of epilepsy, few EEG abnormalities have been described in PME. So, how to use EEG hints to establish the suspected diagnosis of PME as soon as possible should be addressed. We presented a case with refractory myoclonic seizures, and progressive neurological deterioration, diagnosed as PME and neuronal ceroid lipofuscinosis disease by gene testing. The patient manifested with a significant regression in her speech ability and motor balance. The mini-mental state examination showed poor scores of 15/30. The magnetic resonance imaging showed diffused atrophy. Her EEG showed slow background with continuous occipital small spikes and photosensitivity. The following genetic testing with mutation in CLN6 confirmed the diagnosis and excluded the occipital epilepsy. Our case showed rare manifestations and special EEG features of PME, which may be confused with occipital epilepsy or photosensitive epilepsy. Thus, if the continuous occipital spikes and photosensitivity were presented in a patient with refractory seizures and developmental regression, PME should be considered.

  9. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  13. Two siblings with early infantile myoclonic encephalopathy due to mutation in the gene encoding mitochondrial glutamate/H+ symporter SLC25A22.

    Science.gov (United States)

    Cohen, Rony; Basel-Vanagaite, Lina; Goldberg-Stern, Hadassah; Halevy, Ayelet; Shuper, Avinoam; Feingold-Zadok, Michal; Behar, Doron M; Straussberg, Rachel

    2014-11-01

    To characterize a new subset of early myoclonic encephalopathy usually associated with metabolic etiologies with a new genetic entity. We describe two siblings with early myoclonic encephalopathy born to consanguineous parents of Arab Muslim origin from Israel. We used homozygosity mapping and candidate gene sequencing to reveal the genetic basis of the myoclonic syndrome. We found a rare missense mutation in the gene encoding one of the two mitochondrial glutamate/H symporters, SLC25A22. The phenotype of early myoclonic encephalopathy was first linked to the same mutation in 2005 in patients of the same ethnicity as our family. Owing to the devastating nature of this encephalopathy, we focus attention on its clinical history, epileptic semiology, distinct electroencephalography features, and genetic basis. We provide the evidence that an integrated diagnostic strategy combining homozygosity mapping with candidate gene sequencing is efficient in consanguineous families with highly heterogeneous autosomal recessive diseases. Copyright © 2014 European Paediatric Neurology Society. Published by Elsevier Ltd. All rights reserved.

  14. Optimizing antibiotic selection in treating COPD exacerbations

    Directory of Open Access Journals (Sweden)

    Attiya Siddiqi

    2008-03-01

    Full Text Available Attiya Siddiqi, Sanjay SethiDivision of Pulmonary, Critical Care and Sleep Medicine, Department of Medicine, Veterans Affairs Western New York Health Care System and University of Buffalo, State University of New York, Buffalo, New York, USAAbstract: Our understanding of the etiology, pathogenesis and consequences of acute exacerbations of chronic obstructive pulmonary disease (COPD has increased substantially in the last decade. Several new lines of evidence demonstrate that bacterial isolation from sputum during acute exacerbation in many instances reflects a cause-effect relationship. Placebo-controlled antibiotic trials in exacerbations of COPD demonstrate significant clinical benefits of antibiotic treatment in moderate and severe episodes. However, in the multitude of antibiotic comparison trials, the choice of antibiotics does not appear to affect the clinical outcome, which can be explained by several methodological limitations of these trials. Recently, comparison trials with nontraditional end-points have shown differences among antibiotics in the treatment of exacerbations of COPD. Observational studies that have examined clinical outcome of exacerbations have repeatedly demonstrated certain clinical characteristics to be associated with treatment failure or early relapse. Optimal antibiotic selection for exacerbations has therefore incorporated quantifying the risk for a poor outcome of the exacerbation and choosing antibiotics differently for low risk and high risk patients, reserving the broader spectrum drugs for the high risk patients. Though improved outcomes in exacerbations with antibiotic choice based on such risk stratification has not yet been demonstrated in prospective controlled trials, this approach takes into account concerns of disease heterogeneity, antibiotic resistance and judicious antibiotic use in exacerbations.Keywords: COPD, exacerbation, bronchitis, antibiotics

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  18. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  19. EFHC1, a protein mutated in juvenile myoclonic epilepsy, associates with the mitotic spindle through its N-terminus

    International Nuclear Information System (INIS)

    Nijs, Laurence de; Lakaye, Bernard; Coumans, Bernard; Leon, Christine; Ikeda, Takashi; Delgado-Escueta, Antonio V.; Grisar, Thierry; Chanas, Grazyna

    2006-01-01

    A novel gene, EFHC1, mutated in juvenile myoclonic epilepsy (JME) encodes a protein with three DM10 domains of unknown function and one putative EF-hand motif. To study the properties of EFHC1, we expressed EGFP-tagged protein in various cell lines. In interphase cells, the fusion protein was present in the cytoplasm and in the nucleus with specific accumulation at the centrosome. During mitosis EGFP-EFHC1 colocalized with the mitotic spindle, especially at spindle poles and with the midbody during cytokinesis. Using a specific antibody, we demonstrated the same distribution of the endogenous protein. Deletion analyses revealed that the N-terminal region of EFHC1 is crucial for the association with the mitotic spindle and the midbody. Our results suggest that EFHC1 could play an important role during cell division

  20. Personality traits related to juvenile myoclonic epilepsy: MRI reveals prefrontal abnormalities through a voxel-based morphometry study.

    Science.gov (United States)

    de Araújo Filho, Gerardo Maria; Jackowski, Andrea Parolin; Lin, Katia; Guaranha, Mirian S B; Guilhoto, Laura M F F; da Silva, Henrique Hattori; Caboclo, Luís Otávio Sales Ferreira; Júnior, Henrique Carrete; Bressan, Rodrigo Affonseca; Yacubian, Elza Márcia T

    2009-06-01

    Studies involving juvenile myoclonic epilepsy (JME) patients have demonstrated an elevated prevalence of cluster B personality disorders (PD) characterized as emotional instability, immaturity, unsteadiness, lack of discipline, and rapid mood changes. We aimed to verify a possible correlation between structural brain abnormalities in magnetic resonance image (MRI) and the PD in JME using voxel-based morphometry (VBM). Sixteen JME patients with cluster B PD, 38 JME patients without psychiatric disorders, and 30 healthy controls were submitted to a psychiatric evaluation through SCID I and II and to a MRI scan. Significant reduction in thalami and increase in mesiofrontal and frontobasal regions' volumes were observed mainly in JME patients with PD. Structural alterations of the orbitofrontal cortex (OFC), involved in regulation of mood reactivity, impulsivity, and social behavior, were also observed. This study supports the hypothesis of frontobasal involvement in the pathophysiology of cluster B PD related to JME.

  1. Prevention of exacerbations of COPD with pharmacotherapy

    Directory of Open Access Journals (Sweden)

    M. Miravitlles

    2010-06-01

    Full Text Available Exacerbations are a frequent event in the evolution of chronic obstructive pulmonary disease (COPD patients. Individuals with COPD have a mean of 1–3 episodes per year, some of which lead to hospital admission and may even be a cause of death. The importance of COPD exacerbations has become increasingly apparent due to the impact these episodes have on the natural history of disease. It is now known that frequent exacerbations can adversely affect health-related quality of life and short- and long-term pulmonary function. Optimising treatment for stable COPD will help to reduce exacerbations. Long-acting bronchodilators, alone or combined with inhaled corticosteroids, have demonstrated efficacy in reducing the rate of exacerbations in patients with COPD. Other innovative approaches are being investigated, such as the long-term use of macrolides or the use of antibiotics in an effort to suppress bronchial colonisation and consequent exacerbations. Other drugs, such as mucolytics and immunomodulators, have recently provided positive results. Non-pharmacological interventions such as rehabilitation, self-management plans and the maintenance of high levels of physical activity in daily life are also useful strategies to prevent exacerbations in patients with COPD and should be implemented in regular clinical practice.

  2. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  4. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  5. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  6. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  7. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  8. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  10. Myoclonic epilepsy of late onset in trisomy 21 Epilepsia mioclônica de início tardio na trissomia 21

    Directory of Open Access Journals (Sweden)

    Lm. Li

    1995-12-01

    Full Text Available We report the case of a patient with trisomy 21 (T21 with late onset epilepsy. The electro-clinical features were of myoclonic jerks on awakening and generalised tonic clonic seizures, with generalised spike and wave on EEG, and a progressive dementia. As familial Alzheimer's dementia and progressive myoclonic epilepsy (Unverricht-Lundborg type are both linked to the chromosome 21, this case may represent a distinct progressive myoclonic epilepsy related to T21.Pacientes com trissomia do cromossoma 21 (T21, com o passar dos anos, são propensos a desenvolver crises epilépticas parciais concomitantes ao aparecimento de degeneração cerebral do tipo Alzheimer. Pacientes com T21 e demência parecem ter risco maior de apresentarem crises epilépticas que outros pacientes com degeneração cerebral do tipo Alzheimer. O caso relatado é de um paciente com T21 com epilepsia de início tardio. A história clínica consiste de crises mioclônicas ao despertar, ocasionais crises generalizadas tônico-clônicas, demência e ponta onda generalisada no EEG. Demência do tipo Alzheimer familial é ligada ao cromossoma 21, bem como epilepsia mioclônica progressiva (tipo Unverricht-Lundborg. Isto sugere que este caso possa representar um tipo distinto de epilepsia mioclônica progressiva, ligado ao cromossoma 21.

  11. Antioxidant status in acute asthmatic attack in children

    International Nuclear Information System (INIS)

    Al-Abdulla, N.O.; Al-Naama, L.M.; Hassan, M.K.

    2010-01-01

    Objectives: To determine the oxidant - antioxidant imbalance in asthmatic children, by measuring the levels of malondialdehyde (MDA) as an oxidant marker of lipid peroxidation as well as antioxidant compounds like vitamin C, vitamin E and uric acid and to investigate whether their concentrations are associated with more severe asthma. Methods: This case controlled prospective study was conducted on 219 children aged 1-12 years, attending Basra Maternity and Children Hospital. Included were 98 asthmatic children during acute attack and 121 non asthmatic, apparently healthy children. Serum malondialdehyde (MDA) as an oxidant marker of lipid peroxidation, and vitamin C, vitamin E and uric acid (as antioxidants) were estimated in asthmatic children during acute attack and compared with non-asthmatic children. Results: Asthmatic children during exacerbation of their asthma have significant lower serum levels of antioxidant compounds like vitamin C, vitamin E and uric acid (p<0.001) and significantly high malondialdehyde as compared with the controls. MDA was significantly elevated (P< 0.001), while that of vitamin C, vitamin E and uric acid were significantly decreased with increasing severity of asthmatic attack (P<0.001). A significant negative correlation between MDA with vitamin C (P<0.05, r = - 0.44) was observed in severe asthmatic attacks. Conclusion: Asthmatic patients during acute attack suffer a high degree of reactive oxygen species formation causing considerable oxidative stress that is indicated by the high level of oxidants (MDA) and low level of antioxidants. (author)

  12. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  13. Analysis of Surgical Success in Preventing Recurrent Acute Exacerbations in Chronic Pancreatitis

    Science.gov (United States)

    Nealon, William H.; Matin, Sina

    2001-01-01

    Objective To determine whether surgical intervention prevents recurrent acute exacerbations in chronic pancreatitis (CP). Summary Background Data The primary goal of surgical intervention in the treatment of CP has been relief of chronic unrelenting abdominal pain. A subset of patients with CP have intermittent acute exacerbations, often with increasing frequency and often unrelated to ongoing ethanol abuse. Little data exist regarding the effectiveness of surgery to prevent acute attacks. Methods From 1985 to 1999, all patients identified with a diagnosis of CP were recruited to participate in an ongoing program of serial clinic visits and functional and clinical evaluations. Patients were offered surgery using standard criteria. Data were gathered regarding ethanol abuse, pain, narcotic use, and recurrent acute exacerbations requiring hospital admission before and after surgery. Patients were broadly categorized as having severe unrelenting pain alone (group 1), severe pain with intermittent acute exacerbations (group 2), and intermittent acute exacerbations only (group 3). Results Two hundred fifty-nine patients were recruited. One hundred eighty-five patients underwent 199 surgical procedures (124 modified Puestow procedure [LPJ], 29 distal pancreatectomies [DP], and 46 pancreatic head resections [PHR; 14 performed after failure of LPJ]). There were no deaths. The complication rate was 4% for LPJ, 15% for DP, and 27% for PHR. Ethanol abuse was causative in 238 patients (92%). Mean follow-up was 81 months. There were 104 patients in group 1 (86 who underwent surgery), 71 patients in group 2 (64 who underwent surgery), and 84 in group 3 (49 who underwent surgery). No patient without surgery had spontaneous resolution of symptoms. Postoperative pain relief (freedom from narcotic analgesics) was achieved in 153 of 185 patients (83%) overall: 106 of 124 (86%) for LPJ, 19 of 29 (67%) for DP, and 42 of 46 (91%) for PHR. The mean rate of acute exacerbations was 6.3

  14. COPD exacerbations by disease severity in England

    Directory of Open Access Journals (Sweden)

    Merinopoulou E

    2016-04-01

    Full Text Available Evie Merinopoulou,1 Mireia Raluy-Callado,1 Sreeram Ramagopalan,1 Sharon MacLachlan,1 Javaria Mona Khalid2 1Real-World Evidence, Evidera, 2Takeda Development Centre Europe Ltd, London, UK Objectives: Exacerbations of chronic obstructive pulmonary disease (COPD are associated with accelerated disease progression and are important drivers of health care resource utilization. The study aimed to quantify the rates of COPD exacerbations in England and assess health care resource utilization by severity categories according to the Global Initiative for Chronic Obstructive Lung Disease (GOLD 2013.Methods: Data from the Clinical Practice Research Datalink linked to Hospital Episode Statistics were used to identify patients with a COPD diagnosis aged ≥40 years. Those with complete spirometric, modified Medical Research Council Dyspnea Scale information, and exacerbation history 12 months prior to January 1, 2011 (index date were classified into GOLD severity groups. Study outcomes over follow-up (up to December 31, 2013 were exacerbation rates and resource utilization (general practitioner visits, hospital admissions.Results: From the 44,201 patients in the study cohort, 83.5% were classified into severity levels GOLD A: 33.8%, GOLD B: 21.0%, GOLD C: 18.1%, and GOLD D: 27.0%. Mean age at diagnosis was 66 years and 52.0% were male. Annual exacerbation rates per person-year increased with severity, from 0.83 (95% confidence interval [CI]: 0.81–0.85 for GOLD A to 2.51 (95% CI: 2.47–2.55 for GOLD D. General practitioner visit rates per person-year also increased with severity, from 4.82 (95% CI: 4.74–4.93 for GOLD A to 7.44 (95% CI: 7.31–7.61 for GOLD D. COPD-related hospitalization rates per person-year increased from less symptoms (GOLD A: 0.28, GOLD C: 0.39 to more symptoms (GOLD B: 0.52, GOLD D: 0.84.Conclusion: Patients in the most severe category (GOLD D experienced nearly three times the number of exacerbations and COPD

  15. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  16. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  17. Exacerbations of COPD: quantifying the patient's perspective using discrete choice modelling.

    Science.gov (United States)

    Haughney, J; Partridge, M R; Vogelmeier, C; Larsson, T; Kessler, R; Ståhl, E; Brice, R; Löfdahl, C-G

    2005-10-01

    Patient-centred care is the current vogue in chronic obstructive pulmonary disease (COPD), but it is only recently that robust techniques have become available to determine patients' values and preferences. In this international cross-sectional study, patients' concerns and expectations regarding COPD exacerbations were explored using discrete choice modelling. A fractional factorial design was used to develop scenarios comprising a combination of levels for nine different attributes. In face-to-face interviews, patients were presented with paired scenarios and asked to choose the least preferable. Multinomial logit (with hierarchical Bayes) methods were used to estimate utilities. A total of 125 patients (82 males; mean age 66 yrs; 4.6 mean exacerbations.yr-1) were recruited. The attributes of exacerbations considered most important were impact on everyday life (20%), need for medical care (16%), number of future attacks (12%) and breathlessness (11%). The next most important attributes were speed of recovery, productive cough and social impact (all 9%), followed by sleep disturbance and impact on mood (both 7%). Importantly, analysis of utility shifts showed that patients most feared being hospitalised, housebound or bedridden. These issues were more important than symptom improvement. Strategies for the clinical management of chronic obstructive pulmonary disease should clearly address patients' concerns and focus on preventing and treating exacerbations to avoid these feared outcomes.

  18. Proton spectroscopy of the thalamus in a homogeneous sample of patients with easy-to-control juvenile myoclonic epilepsy

    Energy Technology Data Exchange (ETDEWEB)

    Leite, Claudia da Costa; Valente, Kette Dualibi Ramos; Fiore, Lia Arno; Otaduy, Maria Concepcion Garcia, E-mail: claudia.leite@hc.fm.usp.br [Universidade de Sao Paulo (FM/USP), Sao Paulo, SP (Brazil). Faculdade de Medicina

    2017-09-15

    Objective: Juvenile myoclonic epilepsy (JME) is a subtype of genetically determined generalized epilepsy that does not present abnormalities on conventional magnetic resonance imaging. The aim of this study was to identify metabolic alterations in the thalamus in a clinically homogeneous sample of patients with easy-to-control JME, using short-echo time proton magnetic resonance spectroscopy (MRS). Materials and Methods: We performed single-voxel (2 cm × 2 cm × 2 cm), short-echo time (TE = 35 ms) proton MRS of the thalamus in 21 patients with JME and in 14 healthy age-matched controls. We quantified N-acetylaspartate (NAA), total NAA, creatine (Cr), choline, and myo-inositol (MI), as well as the sum of glutamate and glutamine signals, all scaled to internal water content, and we calculated metabolite ratios using Cr as a reference. Values of p < 0.05 were considered significant. Results: The MI level and the MI/Cr ratio were significantly lower in the thalami of patients diagnosed with JME than in those of the controls. Other metabolites and their ratios did not differ significantly between the two groups. Conclusion: In our sample of 21 JME patients, we identified lower levels of MI in the thalamus. No significant abnormalities were observed in the concentrations or ratios of other metabolites. (author)

  19. Does Autoimmunity have a Role in Myoclonic Astatic Epilepsy? A Case Report of Voltage Gated Potassium Channel Mediated Seizures.

    Science.gov (United States)

    Sirsi, Deepa; Dolce, Alison; Greenberg, Benjamin M; Thodeson, Drew

    2016-01-01

    There is expanding knowledge about the phenotypic variability of patients with voltage gated potassium channel complex (VGKC) antibody mediated neurologic disorders. The phenotypes are diverse and involve disorders of the central and peripheral nervous systems. The central nervous system manifestations described in the literature include limbic encephalitis, status epilepticus, and acute encephalitis. We report a 4.5 year-old boy who presented with intractable Myoclonic Astatic Epilepsy (MAE) or Doose syndrome and positive VGKC antibodies in serum. Treatment with steroids led to resolution of seizures and electrographic normalization. This case widens the spectrum of etiologies for MAE to include autoimmunity, in particular VGKC auto-antibodies and CNS inflammation, as a primary or contributing factor. There is an evolving understanding of voltage gated potassium channel complex mediated autoimmunity in children and the role of inflammation and autoimmunity in MAE and other intractable pediatric epilepsy syndromes remains to be fully defined. A high index of suspicion is required for diagnosis and appropriate management of antibody mediated epilepsy syndromes.

  20. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  1. MARGINAL IODINE DEFICIENCY EXACERBATES PERCHLORATE THYROID TOXICITY.

    Science.gov (United States)

    The environmental contaminant perchlorate disrupts thyroid homeostasis via inhibition of iodine uptake into the thyroid. This work tested whether iodine deficiency exacerbates the effects of perchlorate. Female 27 day-old LE rats were fed a custom iodine deficient diet with 0, 50...

  2. Prevention of Acute Exacerbations of COPD

    Science.gov (United States)

    Bourbeau, Jean; Diekemper, Rebecca L.; Ouellette, Daniel R.; Goodridge, Donna; Hernandez, Paul; Curren, Kristen; Balter, Meyer S.; Bhutani, Mohit; Camp, Pat G.; Celli, Bartolome R.; Dechman, Gail; Dransfield, Mark T.; Fiel, Stanley B.; Foreman, Marilyn G.; Hanania, Nicola A.; Ireland, Belinda K.; Marchetti, Nathaniel; Marciniuk, Darcy D.; Mularski, Richard A.; Ornelas, Joseph; Stickland, Michael K.

    2015-01-01

    BACKGROUND: COPD is a major cause of morbidity and mortality in the United States as well as throughout the rest of the world. An exacerbation of COPD (periodic escalations of symptoms of cough, dyspnea, and sputum production) is a major contributor to worsening lung function, impairment in quality of life, need for urgent care or hospitalization, and cost of care in COPD. Research conducted over the past decade has contributed much to our current understanding of the pathogenesis and treatment of COPD. Additionally, an evolving literature has accumulated about the prevention of acute exacerbations. METHODS: In recognition of the importance of preventing exacerbations in patients with COPD, the American College of Chest Physicians (CHEST) and Canadian Thoracic Society (CTS) joint evidence-based guideline (AECOPD Guideline) was developed to provide a practical, clinically useful document to describe the current state of knowledge regarding the prevention of acute exacerbations according to major categories of prevention therapies. Three key clinical questions developed using the PICO (population, intervention, comparator, and outcome) format addressed the prevention of acute exacerbations of COPD: nonpharmacologic therapies, inhaled therapies, and oral therapies. We used recognized document evaluation tools to assess and choose the most appropriate studies and to extract meaningful data and grade the level of evidence to support the recommendations in each PICO question in a balanced and unbiased fashion. RESULTS: The AECOPD Guideline is unique not only for its topic, the prevention of acute exacerbations of COPD, but also for the first-in-kind partnership between two of the largest thoracic societies in North America. The CHEST Guidelines Oversight Committee in partnership with the CTS COPD Clinical Assembly launched this project with the objective that a systematic review and critical evaluation of the published literature by clinical experts and researchers in

  3. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  4. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  5. Characterisation and prevention of exacerbations in frequently exacerbating patienst with COPD

    NARCIS (Netherlands)

    S. Uzun (Sevim)

    2014-01-01

    markdownabstract__Abstract__ Chronic obstructive pulmonary disease (COPD) is a disease which is characterised by airway inflammation and progressive airflow limitation with poor reversibility. Periods of acute deterioration lie in the natural course of the disease and are called exacerbations.

  6. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  7. Clinical characteristics of eosinophilic asthma exacerbations

    DEFF Research Database (Denmark)

    Bjerregaard, Asger; Laing, Ingrid A; Backer, Vibeke

    2017-01-01

    blood cell counts and a screening for common respiratory viruses and bacteria. An eosinophilic exacerbation (EE) was defined as having sputum eosinophils ≥ 3% and a non-eosinophilic exacerbation as NEE). RESULTS: A total of 47 patients were enrolled; 37 (79%) had successful sputum induction...... at baseline, of whom 43% had sputum eosinophils ≥3% (EE). Patients with EE had a significantly lower forced expiratory volume in 1 s (FEV1 ) % predicted (70.8%, P = 0.03) than patients with NEE (83.6%). Furthermore, EE patients were more likely to require supplemental oxygen during admission (63% vs 14%, P...... = 0.002). The prevalence of respiratory viruses was the same in EE and NEE patients (44% vs 52%, P = 0.60), as was bacterial infection (6% vs 14%, P = 0.44). Fractional expiratory nitric oxide (FeNO) correlated with sputum %-eosinophils (ρ = 0.57, P

  8. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  9. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  10. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  11. Myasthenia gravis exacerbation and diarrhea associated with erythromycin treatment

    Directory of Open Access Journals (Sweden)

    Sora Yasri

    2017-01-01

    Full Text Available An important problem in management of the case with myasthenia gravis (MG is the control of exacerbation. There are several possible causes of exacerbation of MG including the use of drug. Here, the authors report a case of MG exacerbation and diarrhea associated with erythromycin treatment.

  12. Exacerbation of Behçet's syndrome and familial Mediterranean fever with menstruation.

    Science.gov (United States)

    Guzelant, Gul; Ozguler, Yesim; Esatoglu, Sinem Nihal; Karatemiz, Guzin; Ozdogan, Huri; Yurdakul, Sebahattin; Yazici, Hasan; Seyahi, Emire

    2017-01-01

    Menstruation triggers several conditions such as migraine, recurrent aphthous stomatitis and acne vulgaris in healthy individuals. There is evidence that Behçet's syndrome (BS) and familial Mediterranean fever (FMF) may exacerbate during menstruation. The aim is to assess whether BS and FMF patients experience menstrual flares. Females of reproductive age with BS and FMF seen consecutively at the outpatient clinic of Cerrahpasa Medical Faculty at Istanbul, as well as apparently healthy hospital workers were studied using a standardised questionnaire. BS patients were asked whether they experienced increased skin-mucosa lesions during the menstrual period. A similar questionnaire assessing this time the frequency of abdominal pain, chest pain and fever attacks was given to the patients with FMF. The healthy controls received both questionnaires. A total of 200 BS patients, 240 FMF patients and 250 healthy controls were studied. The most commonly reported symptom among both BS patients (51%) and healthy controls (62%) was the acneiform lesion. At least 79% patients with FMF reported attacks with menstruation, notably abdominal pain which, majority thought, could be differentiated from dysmenorrhea. Additionally, 76% of healthy controls reported having abdominal pain consistent most probably with dysmenorrhea. This survey showed that, in 68% of the patients with BS at least one skin mucosa lesion was exacerbated with menstruation, this was most commonly acneiform lesion. Menstruation had a slightly stronger effect on FMF, triggering at least one symptom in 79%. The main limitation of the study was the self-reported assessment methodology.

  13. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  14. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  15. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  16. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  17. Patient and physician evaluation of the severity of acute asthma exacerbations

    Directory of Open Access Journals (Sweden)

    Atta J.A.

    2004-01-01

    Full Text Available We studied the ability of patients not experienced in the use of peak expiratory flow meters to assess the severity of their asthma exacerbations and compared it to the assessment of experienced clinicians. We also evaluated which data of physical examination and medical history are used by physicians to subjectively evaluate the severity of asthma attacks. Fifty-seven adult patients (15 men and 42 women, with a mean (± SD age of 37.3 ± 14.5 years and 24.0 ± 17.9 years of asthma symptoms with asthma exacerbations were evaluated in a University Hospital Emergency Department. Patients and physicians independently evaluated the severity of the asthma attack using a linear scale. Patient score, physician score and forced expiratory volume at the first second (FEV1 were correlated with history and physical examination variables, and were also considered as dependent variables in multiple linear regression models. FEV1 correlated significantly with the physician score (rho = 0.42, P = 0.001, but not with patient score (rho = 0.03; P = 0.77. Use of neck accessory muscles, expiratory time and wheezing intensity were the explanatory variables in the FEV1 regression model and were also present in the physician score model. We conclude that physicians evaluate asthma exacerbation severity better than patients and that physician's scoring of asthma severity correlated significantly with objective measures of airway obstruction (FEV1. Some variables (the use of neck accessory muscles, expiratory time and wheezing intensity persisted as explanatory variables in physician score and FEV1 regression models, and should be emphasized in medical schools and emergency settings.

  18. Patient and physician evaluation of the severity of acute asthma exacerbations

    Directory of Open Access Journals (Sweden)

    J.A. Atta

    2004-09-01

    Full Text Available We studied the ability of patients not experienced in the use of peak expiratory flow meters to assess the severity of their asthma exacerbations and compared it to the assessment of experienced clinicians. We also evaluated which data of physical examination and medical history are used by physicians to subjectively evaluate the severity of asthma attacks. Fifty-seven adult patients (15 men and 42 women, with a mean (± SD age of 37.3 ± 14.5 years and 24.0 ± 17.9 years of asthma symptoms with asthma exacerbations were evaluated in a University Hospital Emergency Department. Patients and physicians independently evaluated the severity of the asthma attack using a linear scale. Patient score, physician score and forced expiratory volume at the first second (FEV1 were correlated with history and physical examination variables, and were also considered as dependent variables in multiple linear regression models. FEV1 correlated significantly with the physician score (rho = 0.42, P = 0.001, but not with patient score (rho = 0.03; P = 0.77. Use of neck accessory muscles, expiratory time and wheezing intensity were the explanatory variables in the FEV1 regression model and were also present in the physician score model. We conclude that physicians evaluate asthma exacerbation severity better than patients and that physician's scoring of asthma severity correlated significantly with objective measures of airway obstruction (FEV1. Some variables (the use of neck accessory muscles, expiratory time and wheezing intensity persisted as explanatory variables in physician score and FEV1 regression models, and should be emphasized in medical schools and emergency settings.

  19. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  20. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  2. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  3. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  5. Effect of valproate on the sleep microstructure of juvenile myoclonic epilepsy patients - a cross-sectional CAP based study.

    Science.gov (United States)

    Nayak, Chetan S; Sinha, Sanjib; Nagappa, Madhu; Kandavel, Thennarasu; Taly, Arun B

    2016-01-01

    Studies looking at the effect of anti-epileptic medications on sleep microstructure of patients with epilepsy are almost non-existent. The aim of this study was to compare sleep microstructural characteristics of drug-naïve juvenile myoclonic epilepsy (JME) patients with those on valproate (VPA) monotherapy. Three age- (p = 0.287) and gender- (p = 0.766) matched groups (N = 20 in each group): (1) drug-naïve JME (mean age: 21.2 ± 4.06 years; M : F = 9:11); (2) JME on VPA (mean age: 21.85 ± 4.28 years; M : F = 11:9); (3) healthy controls (mean age: 23.2 ± 3.82 years; M : F = 9:11) underwent overnight polysomnography. Scoring and analysis of arousals American Sleep Disorders Association (ASDA, 2002), cyclic alternating pattern (CAP) (Terzano et al., 2002) parameters were performed. Comparison of arousal and CAP parameters was performed using one-way ANOVA, followed by pairwise comparisons using Fisher's LSD test (p ≤ 0.05). Rapid eye movement (REM) arousal indices were higher in JME patients (Group 1 [p = 0.002] and Group 2 [p <0.001]), whereas the overall and NREM arousal indices were comparable between the three groups. CAP rate was higher in JME patients as compared to controls (p <0.001). Duration of phase A and its subtypes (p <0.001) was reduced in drug-naïve patients as compared to VPA group and controls. Finally, percentage of phase A1 (p = 0.003) was decreased and A3 (p = 0.045) was increased in drug-naïve patients as compared to VPA group and controls. We found significant alterations in REM arousal indices and several CAP parameters in JME patients. However, many of these alterations were not seen in the valproate group. This might indicate that anti-epileptic medications such as valproate may beneficially modulate arousal instability in JME patients, and hence promote sleep quality and continuity. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. [Predictive factors associated with severity of asthma exacerbations].

    Science.gov (United States)

    Atiş, Sibel; Kaplan, Eylem Sercan; Ozge, Cengiz; Bayindir, Suzan

    2008-01-01

    Several factors have been accused for asthma exacerbations, however, very few studies have evaluated whether different factors predict severity of asthma exacerbation. We aimed to determine the predictive factors for severity of asthma exacerbation. Retrospective analysis of data on 93 patients visited our emergency-department because of asthma exacerbation was reviewed. Hospitalization in intensive care unit and/or intubation because of asthma was accepted as the criteria for severe exacerbation. Logistic regression analysis estimated the strength of association of each variable, potentially related to severe asthmatic exacerbation, with severe/very severe as compared to mild/moderate asthmatic exacerbation. Independent variables included in the analysis were age, sex, smoking history, inhaler steroid using, compliance with medication, chronic asthma severity, presence of additional atopic diseases, prick test positivity, provocative factors, number of short-acting beta(2)-agonist using, number of visits to emergency department for asthma over one year period, previous severe exacerbation, pulmonary functions, and blood eosinophil count. 20 were severe/very severe and 73 mild/moderate asthmatic exacerbation. Frequent using of short-acting beta(2)-agonist (OR= 1.5, 95% CI= 1.08-5.3, p= 0.003), noncompliance with medication (OR= 3.6, 95% CI= 1.3-9.9, p= 0.013), previous severe asthmatic exacerbation (OR= 3.8, 95% CI= 1.48-10.01, p= 0.005) and recent admission to hospital (OR= 2.9, 95% CI= 1.07-8.09, p= 0.037) were found to be predictive factors for severe asthmatic exacerbation. Different predictive factors, in particular frequent using of short-acting beta(2)-agonist and noncompliance with medication may be associated with severe asthma exacerbations compared to milder exacerbations. This suggests different mechanisms are responsible for severity of asthma exacerbation.

  7. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  8. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  9. Asthma exacerbations: risk factors for hospital readmissions.

    Science.gov (United States)

    Gonzalez-Barcala, F-J; Calvo-Alvarez, U; Garcia-Sanz, M-T; Garcia-Couceiro, N; Martin-Lancharro, P; Pose, A; Carreira, J-M; Moure-Gonzalez, J-D; Valdes-Cuadrado, L; Muñoz, X

    2018-02-01

    The aim of our study is to analyse hospital readmissions due to asthma, as well as the factors associated with their increase. We carried out a retrospective study including all admissions of patients over 18 years old due to exacerbation of asthma occurring in our hospital between the years 2000 and 2010. The data were gathered by two members of the research team, by reviewing the clinical records. The first hospital admission of each patient was included for this study. An early readmission (ER) was defined as that which occurred in the following 15 days after hospital discharge and late readmission (LR) to that occurring from 16 days after discharge. This study included 2166 hospital admissions and 1316 patients, with a mean age of 62.6 years. Of the 1316 patients analysed, 36 (2.7%) had one ER and 313 (23.8%) one LR. The only factor independently associated with a higher probability of an ER was poor lung function. A higher probability of LR was associated with a greater severity of the asthma (OR: 17.8, for severe asthma versus intermittent asthma), to have had any hospital admission in the previous year (OR: 3.5) and the use of a combination of ICS-LABA as maintenance treatment. About 25% of the patients in our area admitted to hospital due to asthma exacerbation had repeat episodes of hospitalisation.

  10. Fine particulate pollution and asthma exacerbations.

    Science.gov (United States)

    Bouazza, Naïm; Foissac, Frantz; Urien, Saik; Guedj, Romain; Carbajal, Ricardo; Tréluyer, Jean-Marc; Chappuy, Hélène

    2017-12-19

    As the results from epidemiological studies about the impact of outdoor air pollution on asthma in children are heterogeneous, our objective was to investigate the association between asthma exacerbation in children and exposure to air pollutants. A database of 1 264 585 paediatric visits during the 2010-2015 period to the emergency rooms from 20 emergency departments (EDs) of 'Assistance Publique Hôpitaux de Paris (APHP)', the largest hospital group in Europe, was used. A total of 47 107 visits were classified as asthma exacerbations. Concentration of air pollutants (nitrogen dioxide, ozone, fine particulate matter (PM) with an aerodynamic diameter smaller than 10  µm (PM 10 ) and 2.5 µm (PM 2.5 )), as well as meteorological data, evolution of respiratory syncytial virus infection and pollen exposition, were collected on an hourly or daily basis for the same period using institutional databases. To assess the association between air pollution and asthma, mixed-effects quasi-Poisson regression modelling was performed. The only compound independently associated with ED visits for asthma was PM 2.5 (Ppollutants. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. Exonic variants associated with development of aspirin exacerbated respiratory diseases.

    Directory of Open Access Journals (Sweden)

    Seung-Woo Shin

    Full Text Available Aspirin-exacerbated respiratory disease (AERD is one phenotype of asthma, often occurring in the form of a severe and sudden attack. Due to the time-consuming nature and difficulty of oral aspirin challenge (OAC for AERD diagnosis, non-invasive biomarkers have been sought. The aim of this study was to identify AERD-associated exonic SNPs and examine the diagnostic potential of a combination of these candidate SNPs to predict AERD. DNA from 165 AERD patients, 397 subjects with aspirin-tolerant asthma (ATA, and 398 normal controls were subjected to an Exome BeadChip assay containing 240K SNPs. 1,023 models (210-1 were generated from combinations of the top 10 SNPs, selected by the p-values in association with AERD. The area under the curve (AUC of the receiver operating characteristic (ROC curves was calculated for each model. SNP Function Portal and PolyPhen-2 were used to validate the functional significance of candidate SNPs. An exonic SNP, exm537513 in HLA-DPB1, showed the lowest p-value (p = 3.40×10-8 in its association with AERD risk. From the top 10 SNPs, a combination model of 7 SNPs (exm537513, exm83523, exm1884673, exm538564, exm2264237, exm396794, and exm791954 showed the best AUC of 0.75 (asymptotic p-value of 7.94×10-21, with 34% sensitivity and 93% specificity to discriminate AERD from ATA. Amino acid changes due to exm83523 in CHIA were predicted to be "probably damaging" to the structure and function of the protein, with a high score of '1'. A combination model of seven SNPs may provide a useful, non-invasive genetic marker combination for predicting AERD.

  12. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  13. Severe exacerbations and decline in lung function in asthma

    DEFF Research Database (Denmark)

    O'Byrne, Paul M; Pedersen, Søren; Lamm, Carl Johan

    2009-01-01

    RATIONALE: To evaluate the association between asthma exacerbations and the decline in lung function, as well as the potential effects of an inhaled corticosteroid, budesonide, on exacerbation-related decline in patients with asthma. OBJECTIVES: To determine whether severe asthma exacerbations...... with low-dose inhaled budesonide prevents severe asthma-related events (exacerbations requiring hospitalization or emergency treatment) and decline in lung function. MEASUREMENTS AND MAIN RESULTS: There were 315 patients who experienced at least one severe asthma exacerbation, of which 305 were analyzable...... of reduction afforded by budesonide, in patients who experienced at least one severe asthma-related event compared with those who did not, was statistically significant (P = 0.042). CONCLUSIONS: Severe asthma exacerbations are associated with a more rapid decline in lung function. Treatment with low doses...

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  15. [Treatment of multiple sclerosis symptoms and exacerbations].

    Science.gov (United States)

    Prieto González, José María

    2014-12-01

    In the last few years, there has been an explosion of new drugs acting on the clinical course of multiple sclerosis (MS) but less attention has been paid to better knowledge of the symptoms of this disease and their pathogenesis and treatment, which is essential to improve patients' quality of life. Because many patients have numerous concurrent symptoms during their clinical course, their management is complex and consequently it is important to know which symptoms are a direct result of the degenerative lesions of MS. The present article describes all the therapeutic options available for spasticity and its associated pain, paroxystic symptoms, fatigue, genitourinary disorders and sexual dysfunction, tremor, ataxia, gait disorder and cognitive impairment, with special emphasis on novel treatments. The article also defines exacerbations, how to recognize them and the available treatments, mainly oral administration of high-dose methylprednisolone and plasmapheresis. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.

  16. Fibrinogen and alpha(1)-antitrypsin in COPD exacerbations

    DEFF Research Database (Denmark)

    Sylvan Ingebrigtsen, Truls; Marott, J. L.; Rode, L.

    2015-01-01

    Background We tested the hypotheses that fibrinogen and alpha(1)-antitrypsin are observationally and genetically associated with exacerbations in COPD. Methods We studied 13 591 individuals with COPD from the Copenhagen General Population Study (2003-2013), of whom 6857 were genotyped for FGB -455...... and exacerbations in instrumental variable analyses. Results Elevated fibrinogen and alpha(1)-antitrypsin levels were associated with increased risk of exacerbations in COPD, HR=1.14 (1.07 to 1.22, p...

  17. Blood Eosinophils and Exacerbations in Chronic Obstructive Pulmonary Disease

    DEFF Research Database (Denmark)

    Vedel-Krogh, Signe; Nielsen, Sune F; Lange, Peter

    2016-01-01

    RATIONALE: Whether high blood eosinophils are associated with COPD exacerbations among individuals with COPD in the general population is largely unknown. OBJECTIVES: To test the hypothesis that high blood eosinophils predict COPD exacerbations. METHODS: Among 81,668 individuals from the Copenhagen...... General Population Study, we examined 7,225 with COPD based on spirometry. We recorded blood eosinophils at baseline and future COPD exacerbations longitudinally, defined as moderate (short-course treatment of systemic corticosteroids) or severe (hospitalization). We also assessed exacerbation risk...... in a subgroup of 203 COPD individuals with clinical COPD, defined as participants with ≥ 10 pack-years, FEV1

  18. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  19. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  20. Long-term Prognosis in COPD Exacerbation: Role of Biomarkers, Clinical Variables and Exacerbation Type.

    Science.gov (United States)

    Grolimund, Eva; Kutz, Alexander; Marlowe, Robert J; Vögeli, Alaadin; Alan, Murat; Christ-Crain, Mirjam; Thomann, Robert; Falconnier, Claudine; Hoess, Claus; Henzen, Christoph; Zimmerli, Werner; Mueller, Beat; Schuetz, Philipp

    2015-06-01

    Long-term outcome prediction in COPD is challenging. We conducted a prospective 5-7-year follow-up study in patients with COPD to determine the association of exacerbation type, discharge levels of inflammatory biomarkers including procalctionin (PCT), C-reactive protein (CRP), white blood cell count (WBC) and plasma proadrenomedullin (ProADM), alone or combined with demographic/clinical characteristics, with long-term all-cause mortality in the COPD setting. The analyzed cohort comprised 469 patients with index hospitalization for pneumonic (n = 252) or non-pneumonic (n = 217) COPD exacerbation. Five-to-seven-year vital status was ascertained via structured phone interviews with patients or their household members/primary care physicians. We investigated predictive accuracy using univariate and multivariate Cox regression models and area under the receiver operating characteristic curve (AUC). After a median [25th-75th percentile] 6.1 [5.6-6.5] years, mortality was 55% (95%CI 50%-59%). Discharge ProADM concentration was strongly associated with 5-7-year non-survival: adjusted hazard ratio (HR)/10-fold increase (95%CI) 10.4 (6.2-17.7). Weaker associations were found for PCT and no significant associations were found for CRP or WBC. Combining ProADM with demographic/clinical variables including age, smoking status, BMI, New York Heart Association dyspnea class, exacerbation type, and comorbidities significantly improved long-term predictive accuracy over that of the demographic/clinical model alone: AUC (95%CI) 0.745 (0.701-0.789) versus 0.727 (0.681-0.772), (p) = .043. In patients hospitalized for COPD exacerbation, discharge ProADM levels appeared to accurately predict 5-7-year all-cause mortality and to improve long-term prognostic accuracy of multidimensional demographic/clinical mortality risk assessment.

  1. Incidence and risk factors for exacerbations of asthma during pregnancy

    Directory of Open Access Journals (Sweden)

    Ali Z

    2013-05-01

    Full Text Available Zarqa Ali, Charlotte Suppli UlrikDepartment of Pulmonary Medicine, Hvidovre Hospital and University of Copenhagen, Copenhagen, DenmarkBackground: Asthma is one of the most common chronic diseases among pregnant women. Acute exacerbations of asthma during pregnancy have an unfavorable impact on pregnancy outcome. This review provides an overview of current knowledge of incidence, mechanisms, and risk factors for acute exacerbations of asthma during pregnancy.Methods: A narrative literature review was carried out using the PubMed database.Results: During pregnancy, up to 6% of women with asthma are hospitalized for an acute exacerbation. The maternal immune system is characterized by a very high T-helper-2:T-helper-1 cytokine ratio during pregnancy and thereby provides an environment essential for fetal survival but one that may aggravate asthma. Cells of the innate immune system such as monocytes and neutrophils are also increased during pregnancy, and this too can exacerbate maternal asthma. Severe or difficult-to-control asthma appears to be the major risk factor for exacerbations during pregnancy, but studies also suggest that nonadherence with controller medication and viral infections are important triggers of exacerbations during pregnancy. So far, inconsistent findings have been reported regarding the effect of fetal sex on exacerbations during pregnancy. Other risk factors for exacerbation during pregnancy include obesity, ethnicity, and reflux, whereas atopy does not appear to be a risk factor.Discussion: The incidence of asthma exacerbations during pregnancy is disturbingly high. Severe asthma – better described as difficult-to-control asthma – nonadherence with controller therapy, viral infections, obesity, and ethnicity are likely to be important risk factors for exacerbations of asthma during pregnancy, whereas inconsistent findings have been reported with regard to the importance of sex of the fetus.Keywords: acute exacerbations

  2. Severe angina pectoris in asthma attack: a case report.

    Science.gov (United States)

    Nabavizadeh, Seyed Hesamedin; Farahbakhsh, Nazanin; Fazel, Ali; Mosavat, Fereshteh; Anushiravani, Amir

    2016-06-01

    Asthma is a chronic inflammatory disorder of the airways related to the obstruction of reversible airflow. Asthma presents as recurrent attacks of cough and dyspnea. Poor control causes recurrent admissions to the ICU, and mortality is related to poor drug compliance and follow-up. Angina pectoris is a syndrome of recurrent chest discomfort related to myocardial ischemia. The presence of these two disorders rarely has been reported. We reported a 12-year-old boy who was referred with exacerbation of asthma and developed angina pectoris during hospitalization. He had labored breathing and diffuse wheezing. During treatment of the asthma, the patient developed severe chest pain due to shunt formation and coronary hypoxia, caused by the sole administration of ventolin, since oxygen had been disconnected. After receiving appropriate therapy, both his asthma and angina recovered, and, to date, he has not experienced angina pectoris again.

  3. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  4. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  5. Th17 profile in COPD exacerbations

    Directory of Open Access Journals (Sweden)

    Ponce-Gallegos MA

    2017-06-01

    Full Text Available Marco Antonio Ponce-Gallegos,1–3 Alejandra Ramírez-Venegas,4 Ramcés Falfán-Valencia1 1HLA Laboratory, Instituto Nacional de Enfermedades Respiratorias Ismael Cosío Villegas, Mexico City, Mexico; 2Medicine Academic Unit, Universidad Autónoma de Nayarit. Tepic, Nayarit, Mexico; 3Interinstitutional Program for Strengthening Research and the Postgraduate in the Pacific (Dolphin, Tepic, Nayarit, México; 4Tobacco Smoking and COPD Research Department, Instituto Nacional de Enfermedades Respiratorias Ismael Cosío Villegas, Mexico City, Mexico Abstract: COPD is characterized by an ongoing inflammatory process of the airways that leads to obstruction or limitation of airflow. It is mainly associated with exposure to cigarette smoke. In addition, it is considered, at present, a serious public health problem, ranking fourth in mortality worldwide. Many cells participate in the pathophysiology of COPD, the most important are neutrophils, macrophages and CD4+ and CD8+ T cells. Neutrophil migration to the inflammation area could be mediated largely by cytokines related to CD4+ Th17 lymphocytes, because it has been shown that IL-17A, IL-17F and IL-22 act as inducers for CXCL8, CXCL1, CXCL5, G-CSF, and GM-CSF secretion by epithelial cells of the airways. The aims of these molecules are differentiation, proliferation and recruitment of neutrophils. Furthermore, it is believed that CD4+ lymphocytes Th17 may be involved in protection against pathogens for which Th1 and Th2 are not prepared to fight. In COPD exacerbations, there is an increased cellularity in the lung region and respiratory tract. Therefore, the increase in the number of neutrophils and macrophages in the airways and the increase in proinflammatory cytokines are directly related to the severity of exacerbations and that is the importance of the functions of Th17 profile in this entity. Keywords: IL-17A, bacteria, virus, IL-17F, IL-22, tobacco smoking

  6. Medically treated exacerbations in COPD by GOLD 1-4

    DEFF Research Database (Denmark)

    Sylvan Ingebrigtsen, Truls; Marott, Jacob L; Lange, Peter

    2015-01-01

    AIM: We hypothesized that medically treated exacerbations in COPD defined as treatments with oral corticosteroids alone or in combination with antibiotics by register linkage with a nationwide prescription registry is a valid, robust and low-biased measure of exacerbations. METHODS: A total of 13...

  7. Factors associated with change in exacerbation frequency in COPD

    DEFF Research Database (Denmark)

    Donaldson, Gavin C; Müllerova, Hanna; Locantore, Nicholas

    2013-01-01

    Patients with chronic obstructive pulmonary disease (COPD) can be categorized as having frequent (FE) or infrequent (IE) exacerbations depending on whether they respectively experience two or more, or one or zero exacerbations per year. Although most patients do not change category from year to y...

  8. Inflammatory biomarkers and exacerbations in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Thomsen, Mette; Ingebrigtsen, Truls Sylvan; Marott, Jacob Louis

    2013-01-01

    Exacerbations of respiratory symptoms in chronic obstructive pulmonary disease (COPD) have profound and long-lasting adverse effects on patients.......Exacerbations of respiratory symptoms in chronic obstructive pulmonary disease (COPD) have profound and long-lasting adverse effects on patients....

  9. Acute exacerbations and pulmonary hypertension in advanced idiopathic pulmonary fibrosis.

    LENUS (Irish Health Repository)

    Judge, Eoin P

    2012-07-01

    The aim of this study was to evaluate the risk factors for and outcomes of acute exacerbations in patients with advanced idiopathic pulmonary fibrosis (IPF), and to examine the relationship between disease severity and neovascularisation in explanted IPF lung tissue. 55 IPF patients assessed for lung transplantation were divided into acute (n=27) and non-acute exacerbation (n=28) groups. Haemodynamic data was collected at baseline, at the time of acute exacerbation and at lung transplantation. Histological analysis and CD31 immunostaining to quantify microvessel density (MVD) was performed on the explanted lung tissue of 13 transplanted patients. Acute exacerbations were associated with increased mortality (p=0.0015). Pulmonary hypertension (PH) at baseline and acute exacerbations were associated with poor survival (p<0.01). PH at baseline was associated with a significant risk of acute exacerbations (HR 2.217, p=0.041). Neovascularisation (MVD) was significantly increased in areas of cellular fibrosis and significantly decreased in areas of honeycombing. There was a significant inverse correlation between mean pulmonary artery pressure and MVD in areas of honeycombing. Acute exacerbations were associated with significantly increased mortality in patients with advanced IPF. PH was associated with the subsequent development of an acute exacerbation and with poor survival. Neovascularisation was significantly decreased in areas of honeycombing, and was significantly inversely correlated with mean pulmonary arterial pressure in areas of honeycombing.

  10. Increased neutrophil expression of pattern recognition receptors during COPD exacerbations

    NARCIS (Netherlands)

    Pouwels, Simon D.; Van Geffen, Wouter H.; Jonker, Marnix R.; Kerstjens, Huib A. M.; Nawijn, Martijn C.; Heijink, Irene H.

    Previously, we observed increased serum levels of damage-associated molecular patterns (DAMPs) during COPD exacerbations. Here, gene expression of DAMP receptors was measured in peripheral blood neutrophils of COPD patients during stable disease and severe acute exacerbation. The expression of

  11. Detection of rhinovirus-associated asthma exacerbations using ...

    African Journals Online (AJOL)

    Ehab

    between common viral respiratory infections and asthma exacerbations. Respiratory viruses have ... positive Rhinovirus RT-PCR test and 4 (50%) of the HRV positive patients were of the ... reaction volume was 50 µl, and the reaction mixture contained 0.9 ..... significance in asthma exacerbation and airway remodeling.

  12. Stability of the frequent COPD exacerbator in the general population

    DEFF Research Database (Denmark)

    Reilev, Mette; Lykkegaard, Jesper; Halling, Anders

    2017-01-01

    Exacerbation frequency is central in treatment strategies for chronic obstructive pulmonary disease. However, whether chronic obstructive pulmonary disease patients from the general population with frequent exacerbations continue to have frequent exacerbations over an extended period of time is c...... considerably over time. This could hold implications for COPD treatment and challenge assumptions made about disease progression....... is currently unknown. In this study, we aimed to investigate the stability of the frequent exacerbator in a population-based setting. To this end, we conducted a nationwide register-based descriptive study with a 10-year follow-up period of chronic obstructive pulmonary disease patients with at least one...... obstructive pulmonary disease treatment guidelines and their practical application. CHRONIC OBSTRUCTIVE LUNG DISEASE: VARIATIONS IN DISEASE PROGRESSION: Patients with chronic obstructive pulmonary disease (COPD) who suffer from frequent exacerbations do not necessarily persist with such severity over time...

  13. Determinants of low risk of asthma exacerbation during pregnancy

    DEFF Research Database (Denmark)

    Ali, Z; Nilas, L; Ulrik, C S

    2018-01-01

    of Asthma during Pregnancy (MAP) programme at Hvidovre Hospital since 2007. Assessment of asthma control, adjustment of treatment, spirometry and measurement of exhaled nitric oxide (FENO) were performed, and baseline characteristics and exacerbation history were collected at enrolment. Determinants of low......: Clinically stable asthma at enrolment, together with no history of previous exacerbations and no prescribed controller medication, is a determinant of low risk of an asthma exacerbation during pregnancy, which may guide clinicians in individualizing surveillance of asthma during pregnancy.......BACKGROUND: Assessment of asthma control every 4-6 weeks during pregnancy is recommended to reduce risk of exacerbation, and by that improve outcome. OBJECTIVE: To identify determinants of pregnancies with low risk of asthma exacerbation. METHODS: All pregnant women enrolled into the Management...

  14. Predicting asthma exacerbations using artificial intelligence.

    Science.gov (United States)

    Finkelstein, Joseph; Wood, Jeffrey

    2013-01-01

    Modern telemonitoring systems identify a serious patient deterioration when it already occurred. It would be much more beneficial if the upcoming clinical deterioration were identified ahead of time even before a patient actually experiences it. The goal of this study was to assess artificial intelligence approaches which potentially can be used in telemonitoring systems for advance prediction of changes in disease severity before they actually occur. The study dataset was based on daily self-reports submitted by 26 adult asthma patients during home telemonitoring consisting of 7001 records. Two classification algorithms were employed for building predictive models: naïve Bayesian classifier and support vector machines. Using a 7-day window, a support vector machine was able to predict asthma exacerbation to occur on the day 8 with the accuracy of 0.80, sensitivity of 0.84 and specificity of 0.80. Our study showed that methods of artificial intelligence have significant potential in developing individualized decision support for chronic disease telemonitoring systems.

  15. Increased Incidence Rate of Trauma- and Stressor-related Disorders in Denmark After the Breivik Attacks in Norway.

    Science.gov (United States)

    Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D

    2017-11-01

    On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.

  16. Acute exacerbations of chronic bronchitis: a pharmacoeconomic review of antibacterial use.

    Science.gov (United States)

    Morris, Stephen; Anderson, Pippa; Irwin, Debra E

    2002-01-01

    Chronic bronchitis is a common problem affecting a large proportion of the adult population. People with chronic bronchitis are subject to recurrent attacks of bronchial inflammation called acute exacerbations of chronic bronchitis (AECBs). In patients with AECBs, symptoms may worsen due to a bacterial infection; the exacerbation is then known as an acute bacterial exacerbation of chronic bronchitis (ABECB). ABECBs are thought to be controllable through the use of antibacterial agents. In this paper we review current evidence on the cost of chronic bronchitis and AECBs, the cost effectiveness of antibacterials in the management of ABECB, and the factors that may affect the cost-effectiveness of antibacterials in the management of ABECB. We find that the number of economic evaluations conducted in this area is small. Of the few economic evaluations that have been conducted there has been only one prospective economic evaluation based on a clinical trial. The remainder are simple decision analysis-based modelling studies or retrospective database studies. Our principle findings are as follows: a key factor affecting the cost-effective use of antibacterials in the management of ABECB is the definitive diagnosis of the condition. Unfortunately, diagnosing a bacterial cause of an AECB is difficult, which presents problems in ensuring that antibacterials are not prescribed unnecessarily;current evidence suggests but does not prove that use of more effective but more costly first-line antibacterials may be relatively cost effective and may minimise overall expenditure by reducing the high costs associated with treatment failure;chronic bronchitis and AECB have a significant and negative physical and psychological effect on health-related quality of life. In conclusion, the small number of economic evaluations conducted in this area, coupled with the nature of the design of these studies, precludes a definitive statement recommending which specific antibacterial should be

  17. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  18. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  19. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  20. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Headache Exacerbates Pain Characteristics in Temporomandibular Disorders.

    Science.gov (United States)

    Costa, Yuri Martins; Alves da Costa, Dayse Regina; de Lima Ferreira, Ana Paula; Porporatti, André Luís; Svensson, Peter; Rodrigues Conti, Paulo César; Bonjardim, Leonardo Rigoldi

    2017-01-01

    To evaluate the impact of headache in adults with masticatory myofascial pain (MMP) on the outcome variables clinical pain (ie, self-reported pain intensity and pressure pain sensitivity), sleep quality, and pain catastrophizing. A total of 97 patients with MMP were diagnosed with co-existing headache (MMPH group, n = 50) or without headache (MMP group, n = 47) according to the Research Diagnostic Criteria for Temporomandibular Disorders (RDC/TMD). The outcome parameters were the Pittsburgh Sleep Quality Index (PSQI); the Catastrophizing Thoughts subscale of the Pain-Related Self-Statement Scale (PRSS-C); pressure pain thresholds (PPTs) of the masseter and anterior temporalis muscles; and self-reported facial pain intensity measured on a 0- to 10-cm visual analog scale (VAS). Student t test for independent samples (α = 1.2%) and factorial analysis of variance (ANOVA) (α = 5%) were used to analyze the data. The MMPH group showed significantly impaired sleep quality (mean ± standard deviation [SD] PSQI score 9.1 ± 3.5) compared with the MMP group (7.2 ± 3.4; P = .008). Subscale scores on the PRSS-C were significantly higher in the MMPH (2.1 ± 1.2) than in the MMP group (1.6 ± 1.4, uncorrected P = .048). Also, the PPTs (kgf/cm²) of the masseter and anterior temporalis muscles were significantly lower in the MMPH group (1.52 ± 0.53; 1.29 ± 0.43, respectively) than in the MMP group (2.09 ± 0.73; 1.70 ± 0.68, respectively; P headache patients had lower PPTs in the anterior temporalis muscle (P = .041) in comparison with non-headache patients. Co-existence of headache further exacerbates clinical characteristics in patients with painful TMD, which implies involvement of common mechanisms and pathways of vulnerability in these patients.

  4. Exacerbation heterogeneity in COPD: subgroup analyses from the FLAME study

    Directory of Open Access Journals (Sweden)

    Vogelmeier CF

    2018-04-01

    Full Text Available Claus F Vogelmeier,1 Kenneth R Chapman,2 Marc Miravitlles,3 Nicolas Roche,4 Jørgen Vestbo,5 Chau Thach,6 Donald Banerji,6 Robert Fogel,6 Francesco Patalano,7 Petter Olsson,8 Konstantinos Kostikas,7 Jadwiga A Wedzicha9 1Member of the German Center for Lung Research (DZL, Department of Medicine, Pulmonary and Critical Care Medicine, University Medical Center Giessen and Marburg, Philipps-Universität Marburg, Marburg, Germany; 2Asthma and Airway Centre, University Health Network and University of Toronto, Toronto, ON, Canada; 3Pneumology Department, Hospital Universitari Vall d’Hebron, CIBER de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 4Service de Pneumologie AP-HP, Cochin Hospital, University Paris Descartes (EA2511, Paris, France; 5Institute of Infection, Immunity and Respiratory Medicine, The University of Manchester and Manchester University NHS Foundation Trust, Manchester, UK; 6Novartis Pharmaceuticals Corporation, East Hanover, NJ, USA; 7Novartis Pharma AG, Basel, Switzerland; 8Novartis Sverige AB, Täby, Sweden; 9National Heart and Lung Institute, Imperial College London, London, UK Background: The FLAME study compared once-daily indacaterol/glycopyrronium (IND/GLY 110/50 µg with twice-daily salmeterol/fluticasone (SFC 50/500 µg in symptomatic patients with moderate to very severe COPD and a history of exacerbations in the previous year. Methods: This prespecified and post hoc subgroup analysis evaluated treatment efficacy on 1 moderate/severe exacerbations according to prior exacerbation history and treatment, and 2 types of exacerbations according to health care resource utilization (HCRU during 1-year follow-up. Results: IND/GLY reduced the rate of moderate/severe exacerbations versus SFC in patients with a history of 1 exacerbation (rate ratio [RR]: 0.83, 95% CI: 0.75–0.93, ≥2 exacerbations (RR: 0.85, 95% CI: 0.70–1.03 and ≥2 exacerbations or ≥1 hospitalization in the previous year (RR: 0.86, 95% CI: 0.74

  5. Relationship between airway colonization, inflammation and exacerbation frequency in COPD.

    Science.gov (United States)

    Tumkaya, Munir; Atis, Sibel; Ozge, Cengiz; Delialioglu, Nuran; Polat, Gurbuz; Kanik, Arzu

    2007-04-01

    To evaluate bacterial colonization and the airway inflammatory response, and its relationship to the frequency of exacerbation in patients with stable chronic obstructive pulmonary disease (COPD). Quantitative bacteriologic cultures, neutrophil elastase, myeloperoxidase (MPO), tumor necrosis factor alpha (TNF-alpha) and interleukin (IL)-8 were measured in bronchoalveoler lavage (BAL) in 39 patients with stable COPD [19 with frequent exacerbation (> or = 3/year), and 20 with infrequent] and in 18 healthy controls (10 smokers and 8 non-smokers). BAL revealed the microorganisms with potential pathogenicity above the established threshold (> or = 10(3)cfu/ml) in 68.4% of patients with frequent exacerbation, 55% of infrequent exacerbation, 40% of smokers and 12.5% of non-smokers controls (P=0.05). BAL MPO, IL-8 and TNF-alpha levels were found to be significantly higher in COPD as compared to controls (P=0.001). However, only IL-8 level was significantly higher in COPD patients with frequent exacerbation as compared to infrequent (P=0.001). Airway bacterial load correlated with levels of airway inflammation markers in COPD (P<0.05). The bacterial load and airway inflammation contributes to each other in stable COPD. However, there is a link only between interleukine (IL)-8 and frequent exacerbations. Clearly, the relationship between bacterial colonization, airway inflammation and frequent exacerbations is of major importance in understanding of the COPD pathogenesis.

  6. Virus-induced exacerbations in asthma and COPD

    Directory of Open Access Journals (Sweden)

    Daisuke eKurai

    2013-10-01

    Full Text Available Chronic obstructive pulmonary disease (COPD is characterized by chronic airway inflammation and/or airflow limitation due to pulmonary emphysema. Chronic bronchitis, pulmonary emphysema, and bronchial asthma may all be associated with airflow limitation; therefore, exacerbation of asthma may be associated with the pathophysiology of COPD. Furthermore, recent studies have suggested that the exacerbation of asthma, namely virus-induced asthma, may be associated with a wide variety of respiratory viruses.COPD and asthma have different underlying pathophysiological processes and thus require individual therapies. Exacerbation of both COPD and asthma, which are basically defined and diagnosed by clinical symptoms, is associated with a rapid decline in lung function and increased mortality. Similar pathogens, including human rhinovirus, respiratory syncytial virus, influenza virus, parainfluenza virus and coronavirus, are also frequently detected during exacerbation of asthma and/or COPD. Immune response to respiratory viral infections, which may be related to the severity of exacerbation in each disease, varies in patients with both COPD and asthma. In this regard, it is crucial to recognize and understand both the similarities and differences of clinical features in patients with COPD and/or asthma associated with respiratory viral infections, especially in the exacerbative stage.In relation to definition, epidemiology, and pathophysiology, this review aims to summarize current knowledge concerning exacerbation of both COPD and asthma by focusing on the clinical significance of associated respiratory virus infections.

  7. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  8. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. Acute kidney injury in stable COPD and at exacerbation

    Directory of Open Access Journals (Sweden)

    Barakat MF

    2015-09-01

    Full Text Available MF Barakat,1 HI McDonald,1 TJ Collier,1 L Smeeth,1 D Nitsch,1 JK Quint1,2 1Faculty of Epidemiology and Population Health, London School of Hygiene and Tropical Medicine, 2Department of Respiratory Epidemiology, Occupational Medicine and Public Health, National Heart and Lung Institute, Imperial College London, London, UK Background: While acute kidney injury (AKI alone is associated with increased mortality, the incidence of hospital admission with AKI among stable and exacerbating COPD patients and the effect of concurrent AKI at COPD exacerbation on mortality is not known.Methods: A total of 189,561 individuals with COPD were identified from the Clinical Practice Research Datalink. Using Poisson and logistic regressions, we explored which factors predicted admission for AKI (identified in Hospital Episode Statistics in this COPD cohort and concomitant AKI at a hospitalization for COPD exacerbation. Using survival analysis, we investigated the effect of concurrent AKI at exacerbation on mortality (n=36,107 and identified confounding factors.Results: The incidence of AKI in the total COPD cohort was 128/100,000 person-years. The prevalence of concomitant AKI at exacerbation was 1.9%, and the mortality rate in patients with AKI at exacerbation was 521/1,000 person-years. Male sex, older age, and lower glomerular filtration rate predicted higher risk of AKI or death. There was a 1.80 fold (95% confidence interval: 1.61, 2.03 increase in adjusted mortality within the first 6 months post COPD exacerbation in patients suffering from AKI and COPD exacerbation compared to those who were AKI free.Conclusion: In comparison to previous studies on general populations and hospitalizations, the incidence and prevalence of AKI is relatively high in COPD patients. Coexisting AKI at exacerbation is prognostic of poor outcome. Keywords: acute renal failure, mortality, emphysema, chronic bronchitis, prognosis

  11. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  12. Participation of CD161(+) and invariant natural killer T cells in pediatric asthma exacerbations.

    Science.gov (United States)

    Carpio-Pedroza, Juan C; Vaughan, Gilberto; del Rio-Navarro, Blanca E; del Río-Chivardí, Jaime M; Vergara-Castañeda, Arely; Jiménez-Zamudio, Luis A; Morales-Flores, Amelia; Rodríguez-Moreno, Guadalupe; Ruiz-Tovar, Karina; Fonseca-Coronado, Salvador; Gonçalves Rossi, Livia M; Escobar-Gutiérrez, Alejandro

    2013-01-01

    Asthma has been defined as a disease of chronic airway inflammation in which many cells and cellular products participate with variable degrees of airflow obstruction and hyperresponsiveness that lead to recurrent episodes of wheezing, breathlessness, chest tightness, and coughing. Prominent among these cellular elements are two cell types referred to as the invariant natural killer T (iNKT) cells and a subpopulation of T cells expressing the molecule CD161, which are both thought to play a role in the pathogenesis of asthma. Although the presence of iNKT and other CD161(+) cells in murine models has been associated with asthma, relatively few studies have been performed in the adult patient with asthma that have been often conflicting and even fewer studies are available in children. The present study was performed to investigate the peripheral blood frequencies of iNKT and CD161(+) T cells in children with asthma. A total of 35 children, 19 stable asthmatic patients, 6 who had experienced an asthmatic attack within 24 hours and had not received any treatment, and 10 healthy controls, aged 6-12 years, were enrolled in the study. iNKT and CD161(+) T-cell frequencies in blood were measured together with quantitative levels of IL-4 and interferon (IFN) γ using a cytofluorimetric approach. The results show that iNKT cells are increased in pediatric asthmatic patients undergoing exacerbations of asthma. These cells also produced less IFN-γ and more IL-4 than children with stable asthma and in healthy control children. These results suggest that iNKT cells might participate in the development of the asthmatic exacerbations. The increased production of IL-4 in conjunction with the decrease of IFN-γ may be mechanistically responsible, at least partially, for the heightening of the immunologic response leading to the asthmatic attack in children. Knowledge of these interactive mechanisms involving the iNKT cell and our understanding of its role in the exacerbation of

  13. JUVENILE MYOCLONIC EPILEPSY: A FOCUS ON THE EFFICACY OF THERAPY AND THE RATE OF RELAPSES ACCORDING TO LONG-TERM FOLLOW-UP DATA

    Directory of Open Access Journals (Sweden)

    K. Yu. Mukhin

    2015-01-01

    Full Text Available Juvenile myoclonic epilepsy (JME is a type of adolescent-onset idiopathic generalized epilepsy with the appearance of massive myoclonic seizures and, in most cases, generalized convulsions occurring chiefly in the period after awakening. It is assumed that there is a two-locus (dominant and recessive model of inheritance of JME; moreover, the dominant gene is located on the short arm of chromosome 6. JME is one of the most common types of epilepsy and most frequent among idiopathic generalized epilepsies. Its rate is 5 to 11 % of all types of epilepsy with some female predominance. The diagnosis of JME creates no problems in typical cases. The disease is generally manifested by a concurrence of myoclonic (usually in the hands and generalized clonic-tonic-clonic seizures occurring during waking. Typical absences and epileptic myoclonus of the eyelid are rarer. Seizures are clearly provoked by sleep deprivation. As in other types of idiopathic epilepsy, the patients’ neurological status is normal; no intellectual disabilities are observed. This type of epilepsy is well treatable and, when initial monotherapy is correctly used, sustainable remission occurs immediately in the vast majority (75–85 % of the patients with JME. However, the problem of these patients, unlike that of patients with many forms of idiopathic epilepsy, is that sleep pattern disturbance, missing a dose of antiepileptic drugs (AED, or therapy refusal give rise to relapse of seizures in the vast majority of patients even in long-term remission.Due to the fact that the data available in the literature on the efficacy of therapy in patients with JME and particularly on the results of its discontinuation are contradictory, the authors of the paper conducted an investigation to determine therapeutic effectiveness and the frequency of relapse of seizures in patients with JME during a long-term follow-up.The study enrolled 106 JME patients who had been regularly followed up at

  14. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  15. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  17. Susceptibility to exacerbation in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Hurst, John R; Vestbo, Jørgen; Anzueto, Antonio

    2010-01-01

    BACKGROUND: Although we know that exacerbations are key events in chronic obstructive pulmonary disease (COPD), our understanding of their frequency, determinants, and effects is incomplete. In a large observational cohort, we tested the hypothesis that there is a frequent-exacerbation phenotype...... of follow-up were 0.85 per person for patients with stage 2 COPD (with stage defined in accordance with Global Initiative for Chronic Obstructive Lung Disease [GOLD] stages), 1.34 for patients with stage 3, and 2.00 for patients with stage 4. Overall, 22% of patients with stage 2 disease, 33% with stage 3...... of COPD that is independent of disease severity. METHODS: We analyzed the frequency and associations of exacerbation in 2138 patients enrolled in the Evaluation of COPD Longitudinally to Identify Predictive Surrogate Endpoints (ECLIPSE) study. Exacerbations were defined as events that led a care provider...

  18. Risk factors for asthma exacerbation in patients presenting to an ...

    African Journals Online (AJOL)

    Conclusion: Lack of corticosteroid use and upper respiratory tract infections are ... Key words: Asthma, asthma exacerbations, risk factors, corticosteroids ..... recall bias may be a limitation. ... obstructive picture on spirometry were included as.

  19. Age-Specific Characteristics of Inpatients with Severe Asthma Exacerbation

    Directory of Open Access Journals (Sweden)

    Kiyoshi Sekiya

    2013-01-01

    Conclusions: The characteristics of inpatients with severe asthma vary depending on age. We need to establish countermeasures for asthma exacerbation according to the characteristics of patients depending on age.

  20. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  3. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  4. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  5. Oxygen therapy in acute exacerbations of chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Ringbaek, T.; Lange, P.; Mogensen, T.

    2008-01-01

    Acute exacerbation of COPD is a major cause of hospitalisation in Denmark. Most of the patients require supplemental oxygen in the acute phase and some patients continue oxygen therapy at home after discharge. In this paper we discuss the physiological mechanisms of respiratory failure seen...... in acute exacerbations of COPD. The principles for oxygen therapy in the acute phase are described and recommendations for oxygen therapy are suggested Udgivelsesdato: 2008/5/5...

  6. Antibiotics usefulness and choice in BPCO acute exacerbation

    OpenAIRE

    Bruno Tartaglino

    2005-01-01

    Although the debate on the role of bacterial infections and antibiotic treatment in AE-COPD remains open, there is evidence that the persistence of bacteria after acute exacerbation (residual bacterial colony) influences the frequency and severity of subsequent acute exacerbation and that antibiotic treatment that induces faster and more complete eradication produces better clinical outcomes. New aspects must now be considered, given that COPD is a chronic illness subject to acute exacerbatio...

  7. Accelerated extracellular matrix turnover during exacerbations of COPD

    DEFF Research Database (Denmark)

    Sand, Jannie M B; Knox, Alan J; Lange, Peter

    2015-01-01

    progression. Extracellular matrix (ECM) turnover reflects activity in tissues and consequently assessment of ECM turnover may serve as biomarkers of disease activity. We hypothesized that the turnover of lung ECM proteins were altered during exacerbations of COPD. METHODS: 69 patients with COPD hospitalised...... of circulating fragments of structural proteins, which may serve as markers of disease activity. This suggests that patients with COPD have accelerated ECM turnover during exacerbations which may be related to disease progression....

  8. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  9. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  10. Antibiotics usefulness and choice in BPCO acute exacerbation

    Directory of Open Access Journals (Sweden)

    Bruno Tartaglino

    2005-10-01

    Full Text Available Although the debate on the role of bacterial infections and antibiotic treatment in AE-COPD remains open, there is evidence that the persistence of bacteria after acute exacerbation (residual bacterial colony influences the frequency and severity of subsequent acute exacerbation and that antibiotic treatment that induces faster and more complete eradication produces better clinical outcomes. New aspects must now be considered, given that COPD is a chronic illness subject to acute exacerbations of varying frequencies and that acute exacerbations correspond to functional respiratory deterioration. One of the parameters that is currently acquiring clinical relevance is the interval free of infection (IFI, the period that elapses between one acute exacerbation and the next, caused by bacterial infection. Another guiding concept in the choice of antibiotic treatment is that not all patients benefit in the same way; those requiring more aggressive treatment are most likely to be those with FEV1 < 50%, frequent exacerbations (> 3/year treated with antibiotics, relevant co-morbidity, under chronic steroid treatment, etc., for these patients it is recommended to administer antibiotics active on the three most common pathogens (in particular H. influenzae, considering the resistance acquired in recent years, and on Pseudomomias aeruginosa.

  11. [The effect of fenspiride on the number of exacerbations and the time of first exacerbation in patients with chronic bronchitis].

    Science.gov (United States)

    Pirozyński, Michał; Skucha, Wojciech; Słomiński, Marek; Chyczewska, Elzbieta; Malinowski, Janusz; Nowak, Dariusz; Bartmińiski, Wojciech; Pachocki, Robert

    2005-08-01

    The aim of the work was evaluation of efficacy of fenspiride b.i.d. on the number of exacerbations and the time to the first exacerbation in patients with chronic bronchitis. Randomized, multicentre study controlled versus placebo was carried out in 12 centers in Poland. All patients, 89 females and 68 males aged between 20 and 74, were treated with fenspiride at the dose of 160 mg/day for a period of 6 months. The following symptoms were recorded every month in order to evaluate the therapeutic efficacy: sputum quality and quantity, cough intensity, dyspnea and bronchospasm. Based on these symptoms diagnosis of exacerbation was performed according to American Thoracic Society criteria. Quality and quantity of sputum and cough significantly improved in the fenspiride group (comparing to the placebo group p= 0.027 and p = 0.049 adequately for sputum and cough). A significant difference between groups was observed in the number of exacerbation episodes and their duration. In the fenspiride group there were 0.53 episodes of exacerbation compared with 1.12 episodes in the placebo group (p = 0.038). Mean duration of exacerbation was 3.3 days in the fenspiride group and 7.3 days in the placebo treated patients (p = 0.034). Time to the first exacerbation differed between groups, but this difference was not statistically significant. Number of side effects observed did not differ between groups. Fenspiride treatment was assessed as relatively effective in terms of influence on exacerbations, and well tolerated during six month therapy.

  12. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  13. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  14. 3D texture analysis reveals imperceptible MRI textural alterations in the thalamus and putamen in progressive myoclonic epilepsy type 1, EPM1.

    Directory of Open Access Journals (Sweden)

    Sanna Suoranta

    Full Text Available Progressive myoclonic epilepsy type 1 (EPM1 is an autosomal recessively inherited neurodegenerative disorder characterized by young onset age, myoclonus and tonic-clonic epileptic seizures. At the time of diagnosis, the visual assessment of the brain MRI is usually normal, with no major changes found later. Therefore, we utilized texture analysis (TA to characterize and classify the underlying properties of the affected brain tissue by means of 3D texture features. Sixteen genetically verified patients with EPM1 and 16 healthy controls were included in the study. TA was performed upon 3D volumes of interest that were placed bilaterally in the thalamus, amygdala, hippocampus, caudate nucleus and putamen. Compared to the healthy controls, EPM1 patients had significant textural differences especially in the thalamus and right putamen. The most significantly differing texture features included parameters that measure the complexity and heterogeneity of the tissue, such as the co-occurrence matrix-based entropy and angular second moment, and also the run-length matrix-based parameters of gray-level non-uniformity, short run emphasis and long run emphasis. This study demonstrates the usability of 3D TA for extracting additional information from MR images. Textural alterations which suggest complex, coarse and heterogeneous appearance were found bilaterally in the thalamus, supporting the previous literature on thalamic pathology in EPM1. The observed putamenal involvement is a novel finding. Our results encourage further studies on the clinical applications, feasibility, reproducibility and reliability of 3D TA.

  15. Emotion-induced myoclonic absence-like seizures in a patient with inv-dup(15) syndrome: a clinical, EEG, and molecular genetic study.

    Science.gov (United States)

    Aguglia, U; Le Piane, E; Gambardella, A; Messina, D; Russo, C; Sirchia, S M; Porta, G; Quattrone, A

    1999-09-01

    We have described a clinical EEG and molecular genetic study of a 9-year-old boy with inv-dup(15) syndrome in whom seizures were induced by emotionally gratifying stimuli. The reflex seizures began 5-20 s after the onset of repeated cheek-kissing from his mother or after viewing of pleasant or funny events. They were characterized by bilateral discharges involving mainly the temporal regions and evolving into myoclonic absence-like seizures. Nonemotional stimuli, such as a pinch, sucking or rubbing his cheeks, or the sound of the kiss alone, failed to provoke seizures. The seizures were resistant to antiepileptic (AED) treatments. Molecular genetic investigations revealed a correct methylation pattern of the chromosomes 15, and three copies (two maternal and one paternal) of the segment 15q11-q13, including the GABRb3 gene. We hypothesize that an overexpression of cerebral gamma-aminobutyric acid (GABA)-mediated inhibition accounts for the severe epilepsy that we observed in this patient.

  16. Generalized epilepsy syndromes and callosal thickness: Differential effects between patients with juvenile myoclonic epilepsy and those with generalized tonic-clonic seizures alone.

    Science.gov (United States)

    Anastasopoulou, Stavroula; Kurth, Florian; Luders, Eileen; Savic, Ivanka

    2017-01-01

    The definition of two well-studied genetic generalized epilepsy syndromes (GGE) - juvenile myoclonic epilepsy (JME) and epilepsy with generalized tonic-clonic seizures alone (GTCS) - suggests the absence of structural cerebral abnormalities. Nevertheless, there are various reports of such abnormalities (especially in JME), where effects mainly occur within thalamus and mesial prefrontal regions. This raises the question of whether JME is particularly linked to midline structure abnormalities, which may also involve the corpus callosum. We studied callosal morphology in a well-matched sample of 22 JME patients, 15 GTCS patients, and 42 controls (CTL) for all of whom we obtained T1-weighted data on a 3T MRI scanner. More specifically, we measured callosal thickness at 100 equidistant points across the callosal surface, and subsequently compared the three groups (JME, GTCS, and CTL) against each other. Significant differences between JME patients and controls were observed within the callosal genu, anterior midbody, and isthmus, with thinner regions in JME patients. There were no significant differences between GTCS patients and controls, and also not between JME patients and GTCS patients. The present outcomes point to callosal abnormalities in JME patients suggesting an impairment of interhemisperic communication between prefrontal, motor, parietal and temporal cortices. These findings further support the notion that structural aberrations are present and differentiated across GGE syndromes, with significant callosal deviations from normality in JME. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  18. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  19. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. Brain imaging with 123I-IMP-SPECT in migraine between attacks

    International Nuclear Information System (INIS)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.; Husstedt, I.W.

    1989-01-01

    123 I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migraine attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors

  1. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  2. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  3. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  4. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  5. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  6. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  7. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Glucose tolerance during pulmonary exacerbations in children with cystic fibrosis.

    Directory of Open Access Journals (Sweden)

    John Widger

    Full Text Available BACKGROUND: Patients with Cystic Fibrosis (CF are relatively insulinopenic and are at risk of diabetes, especially during times of stress. There is a paucity of data in the literature describing glucose tolerance during CF pulmonary exacerbations. We hypothesised that glucose tolerance would be worse during pulmonary exacerbations in children with CF than during clinical stability. METHODS: Patients with CF, 10 years or older, admitted with a pulmonary exacerbation underwent an OGTT within 48 hours of admission. A repeat OGTT was performed 4 to 6 weeks post discharge when the patients were well. RESULTS: Nine patients completed the study. Four patients were found to have normal glucose tolerance, 3 with impaired and 2 with CF related diabetes during the exacerbation. Mean change in 2-hour glucose was 1.1 mmol (SD = 0.77. At the follow up OGTT, 8 of 9 (89% remained within their respective glucose tolerance status groupings. CONCLUSION: The findings of this study show that there is little difference in glucose tolerance during CF exacerbations compared to clinical stability in the majority of patients.

  9. The profile of psychiatric symptoms exacerbated by methamphetamine use.

    Science.gov (United States)

    McKetin, Rebecca; Dawe, Sharon; Burns, Richard A; Hides, Leanne; Kavanagh, David J; Teesson, Maree; McD Young, Ross; Voce, Alexandra; Saunders, John B

    2016-04-01

    Methamphetamine use can produce symptoms almost indistinguishable from schizophrenia. Distinguishing between the two conditions has been hampered by the lack of a validated symptom profile for methamphetamine-induced psychiatric symptoms. We use data from a longitudinal cohort study to examine the profile of psychiatric symptoms that are acutely exacerbated by methamphetamine use. 164 methamphetamine users, who did not meet DSM-IV criteria for a lifetime primary psychotic disorder, were followed monthly for one year to assess the relationship between days of methamphetamine use and symptom severity on the 24-item Brief Psychiatric Rating Scale. Exacerbation of psychiatric symptoms with methamphetamine use was quantified using random coefficient models. The dimensions of symptom exacerbation were examined using principal axis factoring and a latent profile analysis. Symptoms exacerbated by methamphetamine loaded on three factors: positive psychotic symptoms (suspiciousness, unusual thought content, hallucinations, bizarre behavior); affective symptoms (depression, suicidality, guilt, hostility, somatic concern, self-neglect); and psychomotor symptoms (tension, excitement, distractibility, motor hyperactivity). Methamphetamine use did not significantly increase negative symptoms. Vulnerability to positive psychotic and affective symptom exacerbation was shared by 28% of participants, and this vulnerability aligned with a past year DSM-IV diagnosis of substance-induced psychosis (38% vs. 22%, χ(2)(df1)=3.66, p=0.056). Methamphetamine use produced a symptom profile comprised of positive psychotic and affective symptoms, which aligned with a diagnosis of substance-induced psychosis, with no evidence of a negative syndrome. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Postpartum airway responsiveness and exacerbation of asthma during pregnancy

    DEFF Research Database (Denmark)

    Ali, Zarqa; Nilas, Lisbeth; Ulrik, Charlotte Suppli

    2017-01-01

    , diffusing capacity for carbon monoxide, bronchial responsiveness to inhaled mannitol, and inflammatory characteristics in induced sputum. Obtained data were analyzed in relation to exacerbation status during pregnancy. The PD15 is defined as the cumulative administered dose causing a 15% decline in forced......BACKGROUND: Airway responsiveness and inflammation are associated with the clinical manifestations of asthma and the response to pharmacological therapy. OBJECTIVE: To investigate if airway responsiveness and inflammatory characteristics are related to asthma exacerbations during pregnancy....... MATERIALS AND METHODS: In women with asthma who were prescribed controller medication and monitored closely during pregnancy, the risk of exacerbations was analyzed in relation to postpartum measures of fractional exhaled nitric oxide (FENO), skin prick test reactivity, static and dynamic lung volumes...

  11. Job strain and the risk of severe asthma exacerbations

    DEFF Research Database (Denmark)

    Heikkilä, K; Madsen, I E H; Nyberg, S T

    2014-01-01

    BACKGROUND: Many patients and healthcare professionals believe that work-related psychosocial stress, such as job strain, can make asthma worse, but this is not corroborated by empirical evidence. We investigated the associations between job strain and the incidence of severe asthma exacerbations...... in working-age European men and women. METHODS: We analysed individual-level data, collected between 1985 and 2010, from 102 175 working-age men and women in 11 prospective European studies. Job strain (a combination of high demands and low control at work) was self-reported at baseline. Incident severe...... asthma exacerbations were ascertained from national hospitalization and death registries. Associations between job strain and asthma exacerbations were modelled using Cox regression and the study-specific findings combined using random-effects meta-analyses. RESULTS: During a median follow-up of 10 years...

  12. COPD exacerbations in general practice: variability in oral prednisolone courses

    Directory of Open Access Journals (Sweden)

    de Vries Marianne

    2012-01-01

    Full Text Available Abstract Background The use of oral corticosteroids as treatment of COPD exacerbations in primary care is well established and evidence-based. However, the most appropriate dosage regimen has not been determined and remains controversial. Corticosteroid therapy is associated with a number of undesirable side effects, including hyperglycaemias, so differences in prescribing might be relevant. This study examines the differences between GPs in dosage and duration of prednisolone treatment in patients with a COPD exacerbation. It also investigates the number of general practitioners (GPs who adjust their treatment according to the presence of diabetic co-morbidity. Methods Cross-sectional study among 219 GPs and 25 GPs in training, located in the Northern part of the Netherlands. Results The response rate was 69%. Nearly every GP prescribed a continuous dose of prednisolone 30 mg per day. Among GPs there were substantial differences in treatment duration. GPs prescribed courses of five, seven, ten, or fourteen days. A course of seven days was most common. The duration of treatment depended on exacerbation and disease severity. A course of five days was especially prescribed in case of a less severe exacerbation. In a more severe exacerbation duration of seven to fourteen days was more common. Hardly any GP adjusted treatment to the presence of diabetic co-morbidity. Conclusion Under normal conditions GPs prescribe prednisolone quite uniformly, within the range of the current Dutch guidelines. There is insufficient guidance regarding how to adjust corticosteroid treatment to exacerbation severity, disease severity and the presence of diabetic co-morbidity. Under these circumstances, there is a substantial variation in treatment duration.

  13. [Features of Autonomic Response in Children with Bronchial Asthma in the Period of Exacerbation].

    Science.gov (United States)

    Lebedenko, A A; Semernik, O E

    2015-01-01

    Asthma is one of the urgent problems of modern pediatrics, but neuroregulation mechanisms underlying this disease have not been fully disclosed so far. The autonomic interaction assessment in patients with bronchial asthma is important to understand the pathogenesis and prognosis of the disease. The aim of this study was to investigate features of autonomic response in children with asthma in the period of exacerbation. The autonomic nervous system ANS) of 82 children aged 6 to 18 years old with asthma in the period of exacerbation were investigated. The spectral analysis of the heart rate variability and the correlation rhythmography method (skaterography) were used to assess the ANS state. Investigations were carried out at rest and after clinoorthostatic test. Non-respiratory (slow) waves reflecting (be degree of activity of humoral and neural canals of heart rate central regulation were dominated at the spectrogram of 72 (87.80%) children experiencing asthma attack; more than half of patients (58.53%) had predominantly very low-frequency component (VLF%) in the range of fluctuation rate that indicated (the influence of neurohumoral regulation. A significant increase in vagosympathetic balance coefficient (LE/HF) was recorded after clinoorthostatic test indicating the activation of the sympathetic nervous system. According to the correlation rhytlimnography data, a considerable scattering of scattergraphy points was detected in patients in (the baseline state that indicated the predominant influence of parasympathetic nervous system. After the clinoorthostatic test, on the contrary, we observed the of the scattergraphy cloud that could indicate sympathicotonia. The imbalance of the autonomic nervous system in the form of activation of the sympathetic amid neurohumoral regulation department was found in children with asthma.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Usefulness of modified Pulmonary Index Score (mPIS) as a quantitative tool for the evaluation of severe acute exacerbation in asthmatic children.

    Science.gov (United States)

    Koga, Takeshi; Tokuyama, Kenichi; Itano, Atsushi; Morita, Eiji; Ueda, Yutaka; Katsunuma, Toshio

    2015-04-01

    Acute exacerbation of asthma is divided qualitatively into mild, moderate, and severe attacks and respiratory failure. This system is, however, not suitable for estimating small changes in respiratory condition with time and for determining the efficacy of treatments, because it has a qualitative, but not quantitative nature. To evaluate the usefulness of quantitative estimation of asthma exacerbation, modified Pulmonary Index Score (mPIS) values were measured in 87 asthmatic children (mean age, 5.0 ± 0.4 years) during hospitalization. mPIS was calculated by adding the sum of scores for 6 items (scores of 0-3 were given for each item). These consisted of heart rate, respiratory rate, accessory muscle use, inspiratory-to-expiratory flow ratio, degree of wheezing, and oxygen saturation in room air. Measurements were made at visits and at hospitalization and were then made twice a day until discharge. mPIS values were highly correlated among raters. mPIS values at visits were 9.1 ± 0.1 and 12.6 ± 0.4 in subjects with moderate and severe attacks, respectively (p asthma attacks, including the determination of a treatment plan, and prediction of the period of hospitalization in admitted patients, although prospective studies would be required to establish our hypothesis. Copyright © 2014 Japanese Society of Allergology. Production and hosting by Elsevier B.V. All rights reserved.

  17. Withdrawal of inhaled glucocorticoids and exacerbations of COPD

    DEFF Research Database (Denmark)

    Magnussen, Helgo; Disse, Bernd; Rodriguez-Roisin, Roberto

    2014-01-01

    fluticasone propionate (500 μg twice daily) during a 6-week run-in period. Patients were then randomly assigned to continued triple therapy or withdrawal of fluticasone in three steps over a 12-week period. The primary end point was the time to the first moderate or severe COPD exacerbation. Spirometric......-acting bronchodilators has not been fully explored. METHODS: In this 12-month, double-blind, parallel-group study, 2485 patients with a history of exacerbation of COPD received triple therapy consisting of tiotropium (at a dose of 18 μg once daily), salmeterol (50 μg twice daily), and the inhaled glucocorticoid...

  18. Can resistive breathing injure the lung? Implications for COPD exacerbations

    Directory of Open Access Journals (Sweden)

    Vassilakopoulos T

    2016-09-01

    Full Text Available Theodoros Vassilakopoulos, Dimitrios Toumpanakis Pulmonary and Critical Care Medicine, Medical School, National and Kapodistrian University of Athens, Greece Abstract: In obstructive lung diseases, airway inflammation leads to bronchospasm and thus resistive breathing, especially during exacerbations. This commentary discusses experimental evidence that resistive breathing per se (the mechanical stimulus in the absence of underlying airway inflammation leads to lung injury and inflammation (mechanotransduction. The potential implications of resistive breathing-induced mechanotrasduction in COPD exacerbations are presented along with the available clinical evidence. Keywords: resistive breathing, COPD, mechanotransduction, bronchoconstriction, inflammation

  19. Quintupling Inhaled Glucocorticoids to Prevent Childhood Asthma Exacerbations.

    Science.gov (United States)

    Jackson, Daniel J; Bacharier, Leonard B; Mauger, David T; Boehmer, Susan; Beigelman, Avraham; Chmiel, James F; Fitzpatrick, Anne M; Gaffin, Jonathan M; Morgan, Wayne J; Peters, Stephen P; Phipatanakul, Wanda; Sheehan, William J; Cabana, Michael D; Holguin, Fernando; Martinez, Fernando D; Pongracic, Jacqueline A; Baxi, Sachin N; Benson, Mindy; Blake, Kathryn; Covar, Ronina; Gentile, Deborah A; Israel, Elliot; Krishnan, Jerry A; Kumar, Harsha V; Lang, Jason E; Lazarus, Stephen C; Lima, John J; Long, Dayna; Ly, Ngoc; Marbin, Jyothi; Moy, James N; Myers, Ross E; Olin, J Tod; Raissy, Hengameh H; Robison, Rachel G; Ross, Kristie; Sorkness, Christine A; Lemanske, Robert F

    2018-03-08

    Asthma exacerbations occur frequently despite the regular use of asthma-controller therapies, such as inhaled glucocorticoids. Clinicians commonly increase the doses of inhaled glucocorticoids at early signs of loss of asthma control. However, data on the safety and efficacy of this strategy in children are limited. We studied 254 children, 5 to 11 years of age, who had mild-to-moderate persistent asthma and had had at least one asthma exacerbation treated with systemic glucocorticoids in the previous year. Children were treated for 48 weeks with maintenance low-dose inhaled glucocorticoids (fluticasone propionate at a dose of 44 μg per inhalation, two inhalations twice daily) and were randomly assigned to either continue the same dose (low-dose group) or use a quintupled dose (high-dose group; fluticasone at a dose of 220 μg per inhalation, two inhalations twice daily) for 7 days at the early signs of loss of asthma control ("yellow zone"). Treatment was provided in a double-blind fashion. The primary outcome was the rate of severe asthma exacerbations treated with systemic glucocorticoids. The rate of severe asthma exacerbations treated with systemic glucocorticoids did not differ significantly between groups (0.48 exacerbations per year in the high-dose group and 0.37 exacerbations per year in the low-dose group; relative rate, 1.3; 95% confidence interval, 0.8 to 2.1; P=0.30). The time to the first exacerbation, the rate of treatment failure, symptom scores, and albuterol use during yellow-zone episodes did not differ significantly between groups. The total glucocorticoid exposure was 16% higher in the high-dose group than in the low-dose group. The difference in linear growth between the high-dose group and the low-dose group was -0.23 cm per year (P=0.06). In children with mild-to-moderate persistent asthma treated with daily inhaled glucocorticoids, quintupling the dose at the early signs of loss of asthma control did not reduce the rate of severe asthma

  20. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  1. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  2. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  3. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  5. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  6. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  7. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  8. Risk factors for asthma exacerbation in patients presenting to an ...

    African Journals Online (AJOL)

    Background: Asthma exacerbations are caused by a variety of risk factors. Reducing exposure to these risk factors improves the control of asthma and reduces medication needs. Knowledge of the particular risk factors is essential in formulating controlling and treatment protocols. This study set out to determine the risk ...

  9. Prevalence and pattern of asthma exacerbation in children seen at ...

    African Journals Online (AJOL)

    2016-01-15

    Jan 15, 2016 ... asthma. Aim: To determine the prevalence and pattern of acute exacerbation of asthma in ... cost to health care systems and seriously diminish the quality of life of .... also from USA, 2% of all outpatient visits and 2.3% of.

  10. How Clinical Diagnosis Might Exacerbate the Stigma of Mental Illness

    Science.gov (United States)

    Corrigan, Patrick W.

    2007-01-01

    Stigma can greatly exacerbate the experience of mental illness. Diagnostic classification frequently used by clinical social workers may intensify this stigma by enhancing the public's sense of "groupness" and "differentness" when perceiving people with mental illness. The homogeneity assumed by stereotypes may lead mental health professionals and…

  11. Susceptibility to exacerbation in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Hurst, John R; Vestbo, Jørgen; Anzueto, Antonio

    2010-01-01

    be predicted on the basis of the patient's recall of previous treated events. In addition to its association with more severe disease and prior exacerbations, the phenotype was independently associated with a history of gastroesophageal reflux or heartburn, poorer quality of life, and elevated white-cell count...

  12. The premenstrual period and exacerbations in multiple sclerosis

    NARCIS (Netherlands)

    Zorgdrager, A; De Keyser, J

    2002-01-01

    The aim of this study was to assess whether an association exists between the premenstrual period and exacerbations of multiple sclerosis (MS). The subjects were 56 premenopausal patients with relapsing MS and a regular menstrual cycle. Data over the previous 2 years were gathered from a structured

  13. Quadrupling Inhaled Glucocorticoid Dose to Abort Asthma Exacerbations.

    Science.gov (United States)

    McKeever, Tricia; Mortimer, Kevin; Wilson, Andrew; Walker, Samantha; Brightling, Christopher; Skeggs, Andrew; Pavord, Ian; Price, David; Duley, Lelia; Thomas, Mike; Bradshaw, Lucy; Higgins, Bernard; Haydock, Rebecca; Mitchell, Eleanor; Devereux, Graham; Harrison, Timothy

    2018-03-08

    Asthma exacerbations are frightening for patients and are occasionally fatal. We tested the concept that a plan for patients to manage their asthma (self-management plan), which included a temporary quadrupling of the dose of inhaled glucocorticoids when asthma control started to deteriorate, would reduce the incidence of severe asthma exacerbations among adults and adolescents with asthma. We conducted a pragmatic, unblinded, randomized trial involving adults and adolescents with asthma who were receiving inhaled glucocorticoids, with or without add-on therapy, and who had had at least one exacerbation in the previous 12 months. We compared a self-management plan that included an increase in the dose of inhaled glucocorticoids by a factor of 4 (quadrupling group) with the same plan without such an increase (non-quadrupling group), over a period of 12 months. The primary outcome was the time to a first severe asthma exacerbation, defined as treatment with systemic glucocorticoids or an unscheduled health care consultation for asthma. A total of 1922 participants underwent randomization, of whom 1871 were included in the primary analysis. The number of participants who had a severe asthma exacerbation in the year after randomization was 420 (45%) in the quadrupling group as compared with 484 (52%) in the non-quadrupling group, with an adjusted hazard ratio for the time to a first severe exacerbation of 0.81 (95% confidence interval, 0.71 to 0.92; P=0.002). The rate of adverse effects, which were related primarily to local effects of inhaled glucocorticoids, was higher in the quadrupling group than in the non-quadrupling group. In this trial involving adults and adolescents with asthma, a personalized self-management plan that included a temporary quadrupling of the dose of inhaled glucocorticoids when asthma control started to deteriorate resulted in fewer severe asthma exacerbations than a plan in which the dose was not increased. (Funded by the Health Technology

  14. Predicting Acute Exacerbations in Chronic Obstructive Pulmonary Disease.

    Science.gov (United States)

    Samp, Jennifer C; Joo, Min J; Schumock, Glen T; Calip, Gregory S; Pickard, A Simon; Lee, Todd A

    2018-03-01

    With increasing health care costs that have outpaced those of other industries, payers of health care are moving from a fee-for-service payment model to one in which reimbursement is tied to outcomes. Chronic obstructive pulmonary disease (COPD) is a disease where this payment model has been implemented by some payers, and COPD exacerbations are a quality metric that is used. Under an outcomes-based payment model, it is important for health systems to be able to identify patients at risk for poor outcomes so that they can target interventions to improve outcomes. To develop and evaluate predictive models that could be used to identify patients at high risk for COPD exacerbations. This study was retrospective and observational and included COPD patients treated with a bronchodilator-based combination therapy. We used health insurance claims data to obtain demographics, enrollment information, comorbidities, medication use, and health care resource utilization for each patient over a 6-month baseline period. Exacerbations were examined over a 6-month outcome period and included inpatient (primary discharge diagnosis for COPD), outpatient, and emergency department (outpatient/emergency department visits with a COPD diagnosis plus an acute prescription for an antibiotic or corticosteroid within 5 days) exacerbations. The cohort was split into training (75%) and validation (25%) sets. Within the training cohort, stepwise logistic regression models were created to evaluate risk of exacerbations based on factors measured during the baseline period. Models were evaluated using sensitivity, specificity, and positive and negative predictive values. The base model included all confounding or effect modifier covariates. Several other models were explored using different sets of observations and variables to determine the best predictive model. There were 478,772 patients included in the analytic sample, of which 40.5% had exacerbations during the outcome period. Patients with

  15. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  16. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  17. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  18. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  19. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  20. The Burden of Illness Related to Chronic Obstructive Pulmonary Disease Exacerbations in Québec, Canada

    Directory of Open Access Journals (Sweden)

    Tam Dang-Tan

    2017-01-01

    Full Text Available Background. Chronic obstructive pulmonary disease (COPD prevalence in Canada has risen over time. COPD-related exacerbations contribute to the increased health care utilization (HCU in this population. This study investigated the impact of exacerbations on COPD-related HCU. Methods. This retrospective observational cohort study used patient data from the Québec provincial health insurance databases. Eligible patients with a new HCU claim with a diagnostic billing for COPD during 2001–2010 were followed until March 31, 2011. Exacerbation rates and time to first exacerbation were assessed. Unadjusted analyses and multivariable models compared the rate of HCU by exacerbation classification (any [moderate/severe], moderate, or severe. Results. The exacerbation event rate in patients with an exacerbation was 34.3 events/100 patient-years (22.7 for moderate exacerbations and 11.6 for severe exacerbations. Median time to first exacerbation of any classification was 37 months. In unadjusted analyses, COPD-related HCU significantly increased with exacerbation severity. In the multivariable, HCU rates were significantly higher after exacerbation versus before exacerbation (p<0.01 for patients with an exacerbation or moderate exacerbations. For severe exacerbations, general practitioner, respiratory specialist, emergency room, and hospital visits were significantly higher after exacerbation versus before exacerbation (p<0.001. Conclusions. Exacerbations were associated with increased HCU, which was more pronounced for patients with severe exacerbations. Interventions to reduce the risk of exacerbations in patients with COPD may reduce disease burden.

  1. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  2. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  3. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  4. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  6. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  7. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  8. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  9. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  10. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  11. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  12. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  13. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  14. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  15. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  16. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  17. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  18. IMPACT OF THE THERAPY WITH TUMOR NECROSIS FACTOR α INHIBITORS ON THE FREQUENCY OF UVEITIS EXACERBATIONS IN PATIENTS WITH ANKYLOSING SPONDYLITIS

    Directory of Open Access Journals (Sweden)

    Alla A Godzenko

    2014-01-01

    Full Text Available The course of uveitis in patients with ankylosing spondylitis (AS does not always correlate with inflammation in the axial skeleton and peripheral joints. Effect of tumor necrosis factor α (TNFα inhibitors on uveitis has been insufficiently studied yet, unlike their effect on the peripheral joints and spine.Objective. To compare the frequency of uveitis attacks in patients with AS during treatment with TNFα inhibitors and the conventional anti-inflammatory therapy.Materials and Methods. The study included 48 patients with AS and recurrent uveitis treated with TNFα inhibitors: 25 – infliximab, 15 – adalimumab, 9 – etanercept; 7 patients received two or more drugs sequentially. Median [25th, 75th percentiles] of the treatment duration was 3 [3.5; 5] years. The duration of treatment since the first attack of uveitis until administration of TNFα inhibitors was 5 [5; 9.7] years. Eighteen patients received only nonsteroidal anti-inflammatory drugs (NSAIDs, 30 patients received NSAIDs and basic anti-inflammatory drugs (DMARDs, including sulfasalazine (n = 23, methotrexate (n = 4, and cyclosporine (n = 4.Results. The median number of uveitis exacerbations during the standard anti-inflammatory therapy was 1 [0.4; 3] per year; during treatment with TNFα inhibitors – 0 [0; 0.5] per year (p = 0.0007. In 19 of 48 patients (40%, no exacerbations of uveitis were registered during therapy with these drugs. The frequency of uveitis attacks in patients treated with infliximab decreased from 1 [0.2; 2.75] to 0.1 [0; 0.8] episodes per year (p = 0.002, adalimumab – from 1.75 [1; 4.5] to 0 [0; 0.07] (p = 0.04, etanercept – from 0.95 [0.5; 1.75] to 0 [0; 0.07] (p = 0.001.Conclusion. Administration of TNFα inhibitors significantly reduces the frequency of uveitis attacks in patients with AS.

  19. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  20. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  1. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  2. Acute exacerbation of idiopathic pulmonary fibrosis triggered by Aspergillus empyema

    Directory of Open Access Journals (Sweden)

    Atsushi Suzuki

    Full Text Available Acute exacerbation (AE is a severe and life-threatening complication of idiopathic pulmonary fibrosis (IPF. In 2016, the definition and diagnostic criteria for AE-IPF were updated by an international working group. The new definition includes any acute, clinically significant respiratory deterioration (both idiopathic and triggered events characterized by evidence of new widespread alveolar abnormality in patients with IPF. There are no currently proven beneficial management strategies for idiopathic and triggered AE-IPF. This is the first report describing AE-IPF triggered by Aspergillus empyema, which was improved by a combination of corticosteroid, systemic antifungal therapy, local antifungal therapy, and additional pharmacological therapies. Future research may reveal optimal strategies for both idiopathic and triggered AE-IPF. Keywords: Idiopathic pulmonary fibrosis, Acute exacerbation, AE-IPF, Triggered AE, Aspergillus infection

  3. Pneumomediastinum from a severe asthma attack.

    Science.gov (United States)

    Hashim, Taimoor; Chaudry, Ayesha H; Ahmad, Khurram; Imhoff, Jennifer; Khouzam, Rami

    2013-07-01

    Spontaneous pneumomediastinum is a rare complication of an asthma exacerbation characterized by chest pain, dyspnea, neck swelling, and subcutaneous emphysema. Although the condition is usually benign and treatment is primarily supportive, surgical intervention may be needed if the patient develops hemodynamic or respiratory failure.

  4. Study design considerations in a large COPD trial comparing effects of tiotropium with salmeterol on exacerbations

    NARCIS (Netherlands)

    K-M. Beeh (Kai-Michael); B. Hederer (Bettina); T. Glaab (Thomas); A. Müller (Achim); M.P.M.H. Rutten-van Mölken (Maureen); S. Kesten (Steven); C. Vogelmeier (Claus)

    2009-01-01

    textabstractAbstract Currently available long-acting inhaled bronchodilators (tiotropium, salmeterol, formoterol) have demonstrated beneficial effects on exacerbations in placebo-controlled trials. However, there have been no direct comparisons of these drugs with exacerbations as the primary

  5. Serum Reactive Oxygen Metabolite Levels Predict Severe Exacerbations of Asthma

    Science.gov (United States)

    Nakamoto, Keitaro; Watanabe, Masato; Sada, Mitsuru; Inui, Toshiya; Nakamura, Masuo; Honda, Kojiro; Wada, Hiroo; Mikami, Yu; Matsuzaki, Hirotaka; Horie, Masafumi; Noguchi, Satoshi; Yamauchi, Yasuhiro; Koyama, Hikari; Kogane, Toshiyuki; Kohyama, Tadashi; Takizawa, Hajime

    2016-01-01

    Background and Purpose Bronchial asthma (BA) is a chronic airway disease characterized by airway hyperresponsiveness and remodeling, which are intimately linked to chronic airway inflammation. Reactive oxygen species (ROS) such as hydrogen peroxide are generated by inflammatory cells that are involved in the pathogenesis of BA. However, the role of ROS in the management of BA patients is not yet clear. We attempted to determine the role of ROS as a biomarker in the clinical setting of BA. Subjects and Methods We enrolled patients with BA from 2013 through 2015 and studied the degrees of asthma control, anti-asthma treatment, pulmonary function test results, fractional exhaled nitric oxide (FeNO), serum reactive oxygen metabolite (ROM) levels, and serum levels of interleukin (IL)-6 and IL-8. Results We recruited 110 patients with BA. Serum ROM levels correlated with white blood cell (WBC) count (rs = 0.273, p = 0.004), neutrophil count (rs = 0.235, p = 0.014), CRP (rs = 0.403, p < 0.001), and IL-6 (rs = 0.339, p < 0.001). Serum ROM levels and IL-8 and CRP levels negatively correlated with %FEV1 (rs = -0.240, p = 0.012, rs = -0.362, p < 0.001, rs = -0.197, p = 0.039, respectively). Serum ROM levels were significantly higher in patients who experienced severe exacerbation within 3 months than in patients who did not (339 [302–381] vs. 376 [352–414] CARR U, p < 0.025). Receiver-operating characteristics analysis showed that ROM levels correlated significantly with the occurrence of severe exacerbation (area under the curve: 0.699, 95% CI: 0.597–0.801, p = 0.025). Conclusions Serum levels of ROM were significantly associated with the degrees of airway obstruction, WBC counts, neutrophil counts, IL-6, and severe exacerbations. This biomarker may be useful in predicting severe exacerbations of BA. PMID:27776186

  6. [Local immune and oxidative status in exacerbated chronic apical periodontitis].

    Science.gov (United States)

    Konoplya, A I; Goldobin, D D; Loktionov, A L

    The aim of the study was to define local immune and oxidative changes in patients with exacerbated chronic apical periodontitis. These changes were assessed in saliva of 67 patients with the mean age of 31±2.5 before and after treatment. The study revealed disturbances in cytokines and complement system balance and activation of lipids peroxidation. Combination of Gepon or Vobenzim with Essentiale forte H and Kaskatol proved to be the most effective for correction of this imbalance.

  7. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. T cells exacerbate Lyme borreliosis in TLR2-deficient mice

    Directory of Open Access Journals (Sweden)

    Carrie E. Lasky

    2016-11-01

    Full Text Available Infection of humans with the spirochete, Borrelia burgdorferi, causes Lyme borreliosis and can lead to clinical manifestations such as, arthritis, carditis and neurological conditions. Experimental infection of mice recapitulates many of these symptoms and serves as a model system for the investigation of disease pathogenesis and immunity. Innate immunity is known to drive the development of Lyme arthritis and carditis, but the mechanisms driving this response remain unclear. Innate immune cells recognize B. burgdorferi surface lipoproteins primarily via Toll-like receptor (TLR2; however, previous work has demonstrated TLR2-/- mice had exacerbated disease and increased bacterial burden. We demonstrate increased CD4 and CD8 T cell infiltrates in B. burgdorferi-infected joints and hearts of C3H TLR2-/- mice. In vivo depletion of either CD4 or CD8 T cells reduced Borrelia-induced joint swelling and lowered tissue spirochete burden, while depletion of CD8 T cells alone reduced disease severity scores. Exacerbation of Lyme arthritis correlated with increased production of CXCL9 by synoviocytes and this was reduced with CD8 T cell depletion. These results demonstrate T cells can exacerbate Lyme disease pathogenesis and prolong disease resolution possibly through dysregulation of inflammatory responses and inhibition of bacterial clearance.

  10. High salt intake does not exacerbate murine autoimmune thyroiditis

    Science.gov (United States)

    Kolypetri, P; Randell, E; Van Vliet, B N; Carayanniotis, G

    2014-01-01

    Recent studies have shown that high salt (HS) intake exacerbates experimental autoimmune encephalomyelitis and have raised the possibility that a HS diet may comprise a risk factor for autoimmune diseases in general. In this report, we have examined whether a HS diet regimen could exacerbate murine autoimmune thyroiditis, including spontaneous autoimmune thyroiditis (SAT) in non-obese diabetic (NOD.H2h4) mice, experimental autoimmune thyroiditis (EAT) in C57BL/6J mice challenged with thyroglobulin (Tg) and EAT in CBA/J mice challenged with the Tg peptide (2549–2560). The physiological impact of HS intake was confirmed by enhanced water consumption and suppressed aldosterone levels in all strains. However, the HS treatment failed to significantly affect the incidence and severity of SAT or EAT or Tg-specific immunoglobulin (Ig)G levels, relative to control mice maintained on a normal salt diet. In three experimental models, these data demonstrate that HS intake does not exacerbate autoimmune thyroiditis, indicating that a HS diet is not a risk factor for all autoimmune diseases. PMID:24528002

  11. [Warning symptoms of asthma attack and asthma self-management: a national asthma control survey from China].

    Science.gov (United States)

    Lin, J T; Wang, W Q; Zhou, X; Wang, C Z; Huang, M; Cai, S X; Chen, P; Lin, Q C; Zhou, J Y; Gu, Y H; Yuan, Y D; Sun, D J; Yang, X H; Yang, L; Huo, J M; Chen, Z C; Jiang, P; Zhang, J; Ye, X W; Liu, H G; Tang, H P; Liu, R Y; Liu, C T; Zhang, W; Hu, C P; Chen, Y Q; Liu, X J; Dai, L M; Zhou, W; Huang, Y J; Xu, J Y

    2017-08-08

    Objective: To investigate warning symptoms of asthma attack and evaluate asthma self-management status of asthma patients in urban China. Methods: A multi-center, cross-sectional, questionnaire-based survey was carried out from 30 general hospitals dispersed in 30 provinces of mainland China (except for Tibet) during Oct 2015 to May 2016. Information of frequency and warning symptoms of asthma attack, the time from warning symptoms to asthma attack, the impact of asthma attack and asthma self-management were collected from asthma patients of outpatient department. Results: Altogether 3 875 asthmatic outpatients were recruited. 78.1% (3 026/3 875) of the patients reported restriction of exercise and daily activities during asthma exacerbation. 82.5% (3 160/3 829) of the patients had warning symptoms before asthma attack, the most common warning symptoms were cough, chest tightness and shortness of breath. The median time from warning symptoms to asthma attack was 2 h, the mean time was 90 h. Only 4.4% (167/3 829) of the patients had definite confidence to control asthma when symptoms deteriorated. 76.7% (2 937/3 828) of the patients used medications to control asthma when asthma symptoms deteriorated. Medication choice: inhaled corticosteroid (ICS) + formoterol 45.8% (1 776/3 875), short-acting beta-agonist (SABA) 23.9% (927/3 875). Conclusions: Most asthma patients have warning symptoms before asthma attack, the most common symptoms are cough, chest tightness and shortness of breath. The proportion of patients conducting effective asthma self-management remains low.

  12. Serum eosinophil cationic protein levels can be useful for predicting acute exacerbation of asthma

    Directory of Open Access Journals (Sweden)

    Mitsuhiro Kamimura

    1998-01-01

    Full Text Available We report on a case in which five consecutive exacerbations of asthma were monitored by following serum eosinophil cationic protein (ECP levels. The serum ECP level correlated well with each exacerbation and tended to increase even before the exacerbations of asthma became apparent. This case shows that serum levels of ECP can be useful markers of disease activity and may also be predictive markers for acute exacerbation.

  13. Predictors of frequent exacerbations in (ex)smoking and never smoking adults with severe asthma

    NARCIS (Netherlands)

    Westerhof, Guus A.; de Groot, Jantina C.; Amelink, Marijke; de Nijs, Selma B.; ten Brinke, Anneke; Weersink, Els J.; Bel, Elisabeth H.

    2016-01-01

    Persistent eosinophilic airway inflammation is an important driver for asthma exacerbations in non-smokers with asthma. Whether eosinophilic inflammation is also a predictor of asthma exacerbations in (ex)smokers is not known. The aim was to investigate factors associated with frequent exacerbations

  14. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  15. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  16. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  17. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  18. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  19. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  20. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  1. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  2. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  3. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  4. Antibiotics for exacerbations of chronic obstructive pulmonary disease.

    Science.gov (United States)

    Vollenweider, Daniela J; Jarrett, Harish; Steurer-Stey, Claudia A; Garcia-Aymerich, Judith; Puhan, Milo A

    2012-12-12

    Many patients with an exacerbation of chronic obstructive pulmonary disease (COPD) are treated with antibiotics. However, the value of antibiotics remains uncertain as systematic reviews and clinical trials have shown conflicting results. To assess the effects of antibiotics in the management of acute COPD exacerbations on treatment failure as observed between seven days and one month after treatment initiation (primary outcome) and on other patient-important outcomes (mortality, adverse events, length of hospital stay). We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE and other electronically available databases up to September 2012. Randomised controlled trials (RCTs) in people with acute COPD exacerbations comparing antibiotic therapy and placebo with a follow-up of at least seven days. Two review authors independently screened references and extracted data from trial reports. We kept the three groups of outpatients, inpatients and patients admitted to the intensive care unit (ICU) separate for benefit outcomes and mortality because we considered them to be clinically too different to be summarised in one group. We considered outpatients to have a mild to moderate exacerbation, inpatients to have a severe exacerbation and ICU patients to have a very severe exacerbation. Where outcomes or study details were not reported we requested missing data from the authors of the primary studies. We calculated pooled risk ratios (RR) for treatment failure, Peto odds ratios (OR) for rare events (mortality and adverse events) and weighted mean differences (MD) for continuous outcomes using fixed-effect models. We used GRADE to assess the quality of the evidence. Sixteen trials with 2068 participants were included. In outpatients (mild to moderate exacerbations), there was evidence of low quality that antibiotics did statistically significantly reduce the risk for treatment failure between seven days and one month after treatment

  5. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  6. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  7. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  8. A search for covert precipitating clinical parameters in frequent exacerbators of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Ankit Bhatia

    2016-01-01

    Full Text Available Introduction: Acute exacerbations are a significant source of morbidity and mortality associated with chronic obstructive pulmonary disease (COPD. Some patients suffer an inordinate number of exacerbations while others remain relatively protected. The aim of this study was to evaluate the potentially modifiable precipitating parameters of frequent severe exacerbations requiring hospital admission in COPD. Materials and Methods: Consecutive patients admitted with acute exacerbation of COPD for a period of one year in a tertiary care hospital were evaluated prospectively. Data regarding the number of exacerbations in the previous year, current comorbidities, medications, and clinical and functional status of COPD patients were evaluated. Results: We included 98 COPD patients (81.63% men admitted consecutively with exacerbations in our department. The mean number of severe exacerbations was (2.42 per patient/per year, and 65% of the patients had frequent severe exacerbations. Multivariate analysis indicated that serum uric acid, serum total IgE, depression and anxiety, gastroesophageal reflux disease symptoms, air pollution, poor adherence to inhaled therapy, and irregular outpatient followup visits were independent predictors of frequent severe exacerbations. Conclusion: COPD patients with frequent exacerbations should be carefully assessed for modifiable confounding risk factors regardless of poor lung function to decrease exacerbation frequency and related poor prognosis. Raised serum total IgE levels may point towards atopy as an additional comorbidity in COPD while uric acid can have a clinically useful role in risk stratification in a primary care setting.

  9. Predicting an asthma exacerbation in children 2 to 5 years of age

    DEFF Research Database (Denmark)

    Swern, A.S.; Tozzi, C.A.; Knorr, B.

    2008-01-01

    BACKGROUND: Asthma exacerbations in young children are prevalent. Identification of symptoms or other factors that are precursors of asthma exacerbations would be useful for early treatment and prevention. OBJECTIVES: To determine whether diary symptoms and beta2-agonist use before an exacerbation...... could predict an asthma exacerbation in children 2 to 5 years of age. METHODS: Post hoc analyses were conducted on data collected in a study of 689 patients 2 to 5 years of age with asthma symptoms, randomly assigned to montelukast, 4 mg, or placebo daily for 12 weeks. During the study, 196 patients had...... of an exacerbation. These methods predicted 149 (66.8%) of the exacerbations with a very low false-positive rate of 14.2%. CONCLUSIONS: No individual symptom was predictive of an imminent asthma exacerbation, but a combination of increased daytime cough, daytime wheeze, and nighttime beta2-agonist use 1 day before...

  10. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  11. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  12. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  13. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  14. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  15. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  16. Does gastroesophageal reflux increase chronic obstructive pulmonary disease exacerbations?

    Science.gov (United States)

    Iliaz, Sinem; Iliaz, Raim; Onur, Seda Tural; Arici, Serpil; Akyuz, Umit; Karaca, Cetin; Demir, Kadir; Besisik, Fatih; Kaymakoglu, Sabahattin; Akyuz, Filiz

    2016-06-01

    The relationship between chronic obstructive pulmonary disease (COPD) exacerbations and gastroesophageal reflux (GER) has been investigated less than asthma-GER. We aimed to evaluate the presence of GER in patients with COPD and its impact on exacerbations. We included 24 patients with stable mild-moderate stage COPD and 19 volunteers as the control group. We conducted a gastroesophageal reflux disease (GERD) symptom questionnaire, gastroscopy, manometry, and an ambulatory 24-h pH-impedance study. According to the GERD questionnaire, only 5 (20.8%) patients with COPD had typical GER symptoms. According to the 24-h pH-impedance study, the mean DeMeester score (DMS) was 38.1 ± 34.6 in the COPD group and 13.3 ± 16.8 in the control group (p = 0.01). The acid reflux (DMS > 14.7) rate was higher in patients with COPD than in controls (73.9% vs 26.3%, p = 0.01). The symptom association probability positivity rate was 17.4% (n = 4) in the COPD group, which was similar to the controls (p = 0.11). The mean proximal extension rate of reflux (Z 17 cm) was 26.4 ± 12.9% in the COPD group. The proximal extent of reflux was positively correlated with the number of COPD exacerbations per year (p = 0.03, r = 0.448). In the motility results, only 2 (20%) patients in the control group had a minor motility disorder. Seventeen (70.8%) patients in the COPD group had a minor motility disorder, and 4 (16.7%) had major motility disorders (p gastroesophageal reflux was frequent in patients with COPD, but only a quarter had typical reflux symptoms. The proximal extent of reflux may trigger frequent exacerbations of COPD. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Performing Aspirin Desensitization in Aspirin-Exacerbated Respiratory Disease.

    Science.gov (United States)

    Waldram, Jeremy D; Simon, Ronald A

    2016-11-01

    Aspirin-exacerbated respiratory disease (AERD) is characterized by chronic rhinosinusitis with nasal polyps, asthma, and reactions to cyclooxygenase-1-inhibiting drugs. This condition is often refractory to standard medical treatments and results in aggressive nasal polyposis that often requires multiple sinus surgeries. Aspirin desensitization followed by daily aspirin therapy is an important treatment option, and its efficacy has been validated in multiple research studies. Aspirin desensitization is not without risk, but specific protocols and recommendations exist to mitigate the risk. Most patients with AERD can undergo aspirin desensitization in an outpatient setting under the supervision of an allergist. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Incidence and outcomes of patients hospitalized with COPD exacerbation with and without pneumonia

    Directory of Open Access Journals (Sweden)

    Søgaard M

    2016-03-01

    Full Text Available Mette Søgaard,1 Morten Madsen,1 Anders Løkke,2 Ole Hilberg,2 Henrik Toft Sørensen,1 Reimar W Thomsen1 1Department of Clinical Epidemiology, 2Department of Respiratory Medicine, Aarhus University Hospital, Aarhus C, Denmark Background: Pneumonia may be a major contributor to hospitalizations for chronic obstructive pulmonary disease (COPD exacerbation and influence their outcomes.Methods: We examined hospitalization rates, health resource utilization, 30-day mortality, and risk of subsequent hospitalizations for COPD exacerbations with and without pneumonia in Denmark during 2006–2012.Results: We identified 179,759 hospitalizations for COPD exacerbations, including 52,520 first-time hospitalizations (29.2%. Pneumonia was frequent in first-time exacerbations (36.1%, but declined in successive exacerbations to 25.6% by the seventh or greater exacerbation. Pneumonic COPD exacerbations increased 20% from 0.92 per 1,000 population in 2006 to 1.10 per 1,000 population in 2012. Nonpneumonic exacerbations decreased by 6% from 1.74 per 1,000 population to 1.63 per 1,000 population during the same period. A number of markers of health resource utilization were more prevalent in pneumonic exacerbations than in nonpneumonic exacerbations: length of stay (median 7 vs 4 days, intensive care unit admission (7.7% vs 12.5%, and several acute procedures. Thirty-day mortality was 12.1% in first-time pneumonic COPD exacerbations versus 8.3% in first-time nonpneumonic cases (adjusted HR [aHR] 1.20, 95% confidence interval [CI] 1.17–1.24. Pneumonia also predicted increased mortality associated with a second exacerbation (aHR 1.14, 95% CI 1.11–1.18, and up to a seventh or greater exacerbation (aHR 1.10, 95% CI 1.07–1.13. In contrast, the aHR of a subsequent exacerbation was 8%–13% lower for patients with pneumonic exacerbations.Conclusions: Pneumonia is frequent among patients hospitalized for COPD exacerbations and is associated with increased health care

  19. Epilepsia mioclônica progressiva: aspectos clínicos, poligráficos e histopatológicos de um caso Progressive myoclonic epilepsy: clinical, polygraphic and histopathological aspects. A case report

    Directory of Open Access Journals (Sweden)

    Wilson Luiz Sanvito

    1973-06-01

    Full Text Available É relatado um caso caracterizado clinicamente por crises mioclônicas, crises convulsivas do tipo grande mal e rebaixamento mental progressivo. O estudo histo-patológico revelou a presença de corpúsculos intracitoplasmáticos no sistema nervoso central, com as características dos corpúsculos de Lafora. São feitas considerações clínicas, poligráficas, histopatológicas e etiopatogênicas a propósito da epilepsia mioclônica progressiva.A case with myoclonic jerks, grand mal convulsions and progressive mental retardation is reported. The patient died after 4 years and 10 months of disease, and a sister began with similar simptomatology at this time. By histopathological study there were found intracitoplasmatic bodies in the cerebral cortex, basal ganglia, cerebelum and myocardium. Some considerations are made about clinical, polygraphic histological and etiopathogenic aspects.

  20. Pharmacogenetic Aspects of Airways’ Obstruction Relief Therapy of Bronchial Asthma Attacks in Schoolchildren

    Directory of Open Access Journals (Sweden)

    L.V. Mikaluk

    2013-03-01

    Full Text Available On the base of a complex examination of 215 schoolchildren who suffer bronchial asthma, there have been established that clinical manifestations of severity of bronchial obstructive syndrome during disease exacerbation do not depend on acetylating status. However, a homozygosity on both alleles of the glutathione transferase gene (GSTT1+M1+ has been connected to greater severity of asthma attacks, while a lack of the T-allele in children with slow acetylating phenotype has been associated with more frequent use of systemic corticosteroids and somewhat better results of airways obstruction relief therapy. Occurrence of GSTT1+M1+ genotype in patients with accelerated processes of acetylation significantly increased the risk of the inefficiency of bronchial obstruction relief therapy (odds ratio 12.4, relative risk — 6.4, the absolute risk — 50 %.

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  3. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  4. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  5. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  6. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  7. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  8. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  9. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  10. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  11. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  12. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  13. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  14. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  15. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  16. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  17. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  18. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  19. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  3. Exacerbation of bronchiectasis by Pseudomonas monteilii: a case report.

    Science.gov (United States)

    Aditi; Shariff, Malini; Beri, Kiran

    2017-07-24

    Pseudomonas spp are important opportunistic and nosocomial pathogens. One such species is Pseudomonas monteilii (P. monteilii). It has been described as an environmental contaminant and potential pathogen. We identified this organism as the causative agent of an exacerbation of bronchiectasis and an environmental contaminant in our hospital on two separate occasions. P. monteilii was the cause of an exacerbation of bronchiectasis in a 30-year-old HIV negative male. Patient presented with cough with sputum production and exertional dyspnea. The isolate was recovered from a sputum sample in significant counts and definitively identified by Matrix-Assisted Laser Desorption/Ionisation- Time of Flight Mass Spectrometry (MALDI-TOF MS). He was treated with piperacillin-tazobactam and recovered clinically and microbiologically. Another two isolates of the organism were contaminants from the hospital environment. The three isolates were susceptible to all tested antibiotics. Typing by Random amplification of polymorphic DNA (RAPD) found no clonal relationship between them. Less common species of Pseudomonas need to be identified accurately. This organism is identified by commonly used phenotypic systems as P. putida which may have contributed to a lower reported prevalence. P. monteilii is a known environmental contaminant and must also be considered as a potential pathogen, particularly in patients with chronic lung disease.

  4. 5-Aminosalicylate intolerance causing exacerbation in pediatric ulcerative colitis.

    Science.gov (United States)

    Shimizu, Hirotaka; Arai, Katsuhiro; Tang, Julian; Hosoi, Kenji; Funayama, Rie

    2017-05-01

    5-Aminosalicylate (5-ASA) is widely used as the first-line drug for ulcerative colitis (UC). 5-ASA is mostly a safe and effective drug, but it can bring about exacerbation due to 5-ASA intolerance. 5-ASA intolerance can be confusing and it can mislead physicians into considering unnecessary treatment escalation, including corticosteroid (CS), biologics, or even surgery. In spite of the clinical importance of 5-ASA intolerance, there have been few studies on its incidence, clinical features, and diagnosis. In order to evaluate the incidence, characteristic symptoms, disease course, and laboratory data of children with 5-ASA intolerance, we retrospectively reviewed the medical records of 80 children with UC. Eleven of 80 children (13.8%) with UC were diagnosed with 5-ASA intolerance. The median time between the initiation of 5-ASA and the onset of 5-ASA intolerance was 10 days (range, 4-20 days) in patients not receiving CS. Drug-induced lymphocyte stimulation test (DLST) was performed in 10 patients, and was positive in eight. C-reactive protein (CRP) increased significantly when exacerbation of colitis symptoms occurred. The incidence of 5-ASA intolerance was relatively high. Besides the challenge test, elevation of CRP and positive DLST appeared to support the diagnosis of 5-ASA intolerance. © 2017 Japan Pediatric Society.

  5. Tic Exacerbation in Adults with Tourette Syndrome: A Case Series

    Directory of Open Access Journals (Sweden)

    Sara M. Schaefer

    2017-03-01

    Full Text Available Background: Tourette syndrome (TS has been described as peaking in adolescence with subsequent regression. We report patients who were diagnosed with TS during childhood who experienced a latent period (significant reduction in or absence of tics followed by tic re-emergence in adulthood.Methods: We performed a retrospective chart review of outpatients over age 21 seen at the Yale neurology clinic between January 2012 and July 2016 who were diagnosed with childhood-onset tics, and who experienced a latent period of greater than 1 year followed by an exacerbation.Results: Sixteen patients were identified. The mean latent period was 16 years. Ten patients (62.5% identified an exacerbation trigger, most commonly changes in substance use (five patients. Seven patients (43.8% reported worsening of tics since childhood. Six patients (37.5% had received pharmacological intervention for tics as children, and 15 patients (93.8% as adults. Six of 15 patients (40.0% had an effective response from those pharmacological intervention(s.Discussion: Our study demonstrates that the decline in symptoms as patients age may represent temporary improvement. The latent period lasted years in our patients, different from the more rapid waxing and waning in children. A change in substance use was an important trigger. Requests for pharmacological intervention were not necessarily correlated with worsening tic severity. 

  6. Tic Exacerbation in Adults with Tourette Syndrome: A Case Series.

    Science.gov (United States)

    Schaefer, Sara M; Chow, Christopher A; Louis, Elan D; Robakis, Daphne

    2017-01-01

    Tourette syndrome (TS) has been described as peaking in adolescence with subsequent regression. We report patients who were diagnosed with TS during childhood who experienced a latent period (significant reduction in or absence of tics) followed by tic re-emergence in adulthood. We performed a retrospective chart review of outpatients over age 21 seen at the Yale neurology clinic between January 2012 and July 2016 who were diagnosed with childhood-onset tics, and who experienced a latent period of greater than 1 year followed by an exacerbation. Sixteen patients were identified. The mean latent period was 16 years. Ten patients (62.5%) identified an exacerbation trigger, most commonly changes in substance use (five patients). Seven patients (43.8%) reported worsening of tics since childhood. Six patients (37.5%) had received pharmacological intervention for tics as children, and 15 patients (93.8%) as adults. Six of 15 patients (40.0%) had an effective response from those pharmacological intervention(s). Our study demonstrates that the decline in symptoms as patients age may represent temporary improvement. The latent period lasted years in our patients, different from the more rapid waxing and waning in children. A change in substance use was an important trigger. Requests for pharmacological intervention were not necessarily correlated with worsening tic severity.

  7. Chronic Hepatitis B with Spontaneous Severe Acute Exacerbation

    Directory of Open Access Journals (Sweden)

    Wei-Lun Tsai

    2015-11-01

    Full Text Available Chronic hepatitis B virus (HBV infection is a major global health problem with an estimated 400 million HBV carriers worldwide. In the natural history of chronic hepatitis B (CHB, spontaneous acute exacerbation (AE is not uncommon, with a cumulative incidence of 10%–30% every year. While exacerbations can be mild, some patients may develop hepatic decompensation and even die. The underlying pathogenesis is possibly related to the activation of cytotoxic T lymphocyte-mediated immune response against HBV. An upsurge of serum HBV DNA usually precedes the rise of alanine aminotransferase (ALT and bilirubin. Whether antiviral treatment can benefit CHB with severe AE remains controversial, but early nucleos(tide analogues treatment seemed to be associated with an improved outcome. There has been no randomized study that compared the effects of different nucleos(tide analogues (NA in the setting of CHB with severe AE. However, potent NAs with good resistance profiles are recommended. In this review, we summarized current knowledge regarding the natural history, pathogenetic mechanisms, and therapeutic options of CHB with severe AE.

  8. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  9. Prediction and course of symptoms and lung function around an exacerbation in chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    van den Berge Maarten

    2012-06-01

    Full Text Available Abstract Background Frequent exacerbations induce a high burden to Chronic Obstructive Pulmonary Disease (COPD. We investigated the course of exacerbations in the published COSMIC study that investigated the effects of 1-year withdrawal of fluticasone after a 3-month run-in treatment period with salmeterol/fluticasone in patients with COPD. Methods In 373 patients, we evaluated diary cards for symptoms, Peak Expiratory Flow (PEF, and salbutamol use and assessed their course during exacerbations. Results There were 492 exacerbations in 224 patients. The level of symptoms of cough, sputum, dyspnea and nocturnal awakening steadily increased from 2 weeks prior to exacerbation, with a sharp rise during the last week. Symptoms of cough, sputum, and dyspnea reverted to baseline values at different rates (after 4, 4, and 7 weeks respectively, whereas symptoms of nocturnal awakening were still increased after eight weeks. The course of symptoms was similar around a first and second exacerbation. Increases in symptoms and salbutamol use and decreases in PEF were associated with a higher risk to develop an exacerbation, but with moderate predictive values, the areas under the receiver operating curves ranging from 0.63 to 0.70. Conclusions Exacerbations of COPD are associated with increased symptoms that persist for weeks and the course is very similar between a first and second exacerbation. COPD exacerbations are preceded by increased symptoms and salbutamol use and lower PEF, yet predictive values are too low to warrant daily use in clinical practice.

  10. Factors influencing exacerbation-related self-management in patients with COPD: a qualitative study.

    Science.gov (United States)

    Korpershoek, Yjg; Vervoort, Scjm; Nijssen, Lit; Trappenburg, Jca; Schuurmans, M J

    2016-01-01

    In patients with COPD, self-management skills are important to reduce the impact of exacerbations. However, both detection and adequate response to exacerbations appear to be difficult for some patients. Little is known about the underlying process of exacerbation-related self-management. Therefore, the objective of this study was to identify and explain the underlying process of exacerbation-related self-management behavior. A qualitative study using semi-structured in-depth interviews was performed according to the grounded theory approach, following a cyclic process in which data collection and data analysis alternated. Fifteen patients (male n=8; age range 59-88 years) with mild to very severe COPD were recruited from primary and secondary care settings in the Netherlands, in 2015. Several patterns in exacerbation-related self-management behavior were identified, and a conceptual model describing factors influencing exacerbation-related self-management was developed. Acceptance, knowledge, experiences with exacerbations, perceived severity of symptoms and social support were important factors influencing exacerbation-related self-management. Specific factors influencing recognition of exacerbations were heterogeneity of exacerbations and habituation to symptoms. Feelings of fear, perceived influence on exacerbation course, patient beliefs, ambivalence toward treatment, trust in health care providers and self-empowerment were identified as specific factors influencing self-management actions. This study provided insight into factors influencing exacerbation-related self-management behavior in COPD patients. The conceptual model can be used as a framework for health care professionals providing self-management support. In the development of future self-management interventions, factors influencing the process of exacerbation-related self-management should be taken into account.

  11. Antibody deficiency in patients with frequent exacerbations of Chronic Obstructive Pulmonary Disease (COPD).

    Science.gov (United States)

    McCullagh, Brian N; Comellas, Alejandro P; Ballas, Zuhair K; Newell, John D; Zimmerman, M Bridget; Azar, Antoine E

    2017-01-01

    Chronic Obstructive Pulmonary Disease is the third leading cause of death in the US, and is associated with periodic exacerbations, which account for the largest proportion of health care utilization, and lead to significant morbidity, mortality, and worsening lung function. A subset of patients with COPD have frequent exacerbations, occurring 2 or more times per year. Despite many interventions to reduce COPD exacerbations, there is a significant lack of knowledge in regards to their mechanisms and predisposing factors. We describe here an important observation that defines antibody deficiency as a potential risk factor for frequent COPD exacerbations. We report a case series of patients who have frequent COPD exacerbations, and who were found to have an underlying primary antibody deficiency syndrome. We also report on the outcome of COPD exacerbations following treatment in a subset with of these patients with antibody deficiency. We identified patients with COPD who had 2 or more moderate to severe exacerbations per year; immune evaluation including serum immunoglobulin levels and pneumococcal IgG titers was performed. Patients diagnosed with an antibody deficiency syndrome were treated with either immunoglobulin replacement therapy or prophylactic antibiotics, and their COPD exacerbations were monitored over time. A total of 42 patients were identified who had 2 or more moderate to severe COPD exacerbations per year. Twenty-nine patients had an underlying antibody deficiency syndrome: common variable immunodeficiency (8), specific antibody deficiency (20), and selective IgA deficiency (1). Twenty-two patients had a follow-up for at least 1 year after treatment of their antibody deficiency, which resulted in a significant reduction of COPD exacerbations, courses of oral corticosteroid use and cumulative annual dose of oral corticosteroid use, rescue antibiotic use, and hospitalizations for COPD exacerbations. This case series identifies antibody deficiency as a

  12. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  13. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  14. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  15. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  16. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  17. Prediction of exacerbation chronic bronchopulmonary diseases in children with influenza

    Directory of Open Access Journals (Sweden)

    O. I. Afanaseva

    2015-01-01

    Full Text Available The objective: To develop a method for predicting exacerbation of chronic illness in children with asthma and cystic fibrosis, patients with influenza, based on the study of the dynamics of cytokines. Materials and methods: Were examined 52 patients with bronchial asthma and 45 children with cystic fibrosis at the age from 1 year to 12 years, located in infectious pulmonary Department at the planned treatment of underlying pathology, in which influenza was in-hospital infection. Control group observations included 40 patients with the flu, without concomitant pulmonary disease. The etiology of viral infection was established by detection of viral RNA in nasopharyngeal swabs by PCR. Among the influenza viruses were identified influenza АH1N1, АH3N2, influenza B, and in 2009–2010 the predominant antigen was the pandemic influenza virus АH1N1pdm09. Determination of the concentration of serum interleukins IL-1β, IL-4, IL-8, IL-10, ТNF-α, IFN-γ was performed in the 1st and 3rd day of hospitalization cytokines by the solid-phase immune-enzyme assay. Analysis of the results performed using statistical package SPSS 17.0 EN for Windows. Results: The flu caused the aggravation associated bronchopulmonary pathology in 2/3 of children, as MV patients, and patients with BA (65,4%-66,7%, respectively. With an increase of the ratio of IL-4 / IFN-γ and IL-10/IFN-γ, at least 5-6 times, influenza can be considered a trigger of exacerbation of chronic bronchopulmonary pathologies that require amplification of the therapy of bronchial asthma and of сystic fibrosis. The growth of prognostic coefficients in 2-3 times allows using for treatment of influenza in these patients only antiviral agents. Conclusion: The study has shown a method for predicting exacerbation of bronchial asthma and cystic fibrosis in children at an early stage of influenza by calculating the ratio of IL-4/IFN-γ and IL-10/IFN-γ in children aged from 1 year to 12 years. 

  18. Bevacizumab Exacerbates Paclitaxel-Induced Neuropathy: A Retrospective Cohort Study.

    Directory of Open Access Journals (Sweden)

    Ayumu Matsuoka

    Full Text Available Bevacizumab (BEV, a humanized anti-vascular endothelial growth factor (VEGF monoclonal antibody, enhances the antitumor effectiveness of paclitaxel (PTX-based chemotherapy in many metastatic cancers. A recent study in mice showed that VEGF receptor inhibitors can interfere with the neuroprotective effects of endogenous VEGF, potentially triggering the exacerbation of PTX-induced neuropathy. In clinical trials, exacerbation of neuropathy in patients who received PTX combined with BEV (PTX+BEV has generally been explained by increased exposure to PTX owing to the extended duration of chemotherapy. We investigated whether the concurrent use of BEV is associated with the exacerbation of PTX-induced neuropathy.Female patients with breast cancer who had received weekly PTX or PTX+BEV from September 2011 through May 2016 were studied retrospectively. PTX-induced neuropathy was evaluated at the same time points (at the 6th and 12th courses of chemotherapy in both cohorts. A multivariate Cox proportional-hazards model was used to assess the independent effect of BEV on the time to the onset of neuropathy.A total of 107 patients (median age, 55 years; range, 32-83 were studied. Sixty-one patients received PTX as adjuvant chemotherapy, 23 received PTX for metastatic disease, and 23 received PTX+BEV for metastatic disease. Peripheral sensory neuropathy was worse in patients who received PTX+BEV than in those who received PTX alone: at the 6th course, Grade 0/1/2/3 = 4/13/4/0 vs. 25/42/6/0 (P = 0.095; at the 12th course, 2/3/11/3 vs. 7/30/23/2 (P = 0.016. At the 12th course, the incidence of Grade 2 or higher neuropathy was significantly higher in patients treated with PTX+BEV than in those treated with PTX alone (74% vs. 40%; P = 0.017. In multivariate analysis, BEV was significantly associated with an increased risk of neuropathy (HR 2.32, 95% CI 1.21-4.44, P = 0.012.The concurrent use of BEV could worsen PTX-induced neuropathy in patients with breast

  19. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  1. Frequency of exacerbations in patients with chronic obstructive pulmonary disease: an analysis of the SPIROMICS cohort.

    Science.gov (United States)

    Han, MeiLan K; Quibrera, Pedro M; Carretta, Elizabeth E; Barr, R Graham; Bleecker, Eugene R; Bowler, Russell P; Cooper, Christopher B; Comellas, Alejandro; Couper, David J; Curtis, Jeffrey L; Criner, Gerard; Dransfield, Mark T; Hansel, Nadia N; Hoffman, Eric A; Kanner, Richard E; Krishnan, Jerry A; Martinez, Carlos H; Pirozzi, Cheryl B; O'Neal, Wanda K; Rennard, Stephen; Tashkin, Donald P; Wedzicha, Jadwiga A; Woodruff, Prescott; Paine, Robert; Martinez, Fernando J

    2017-08-01

    Present treatment strategies to stratify exacerbation risk in patients with chronic obstructive pulmonary disease (COPD) rely on a history of two or more events in the previous year. We aimed to understand year to year variability in exacerbations and factors associated with consistent exacerbations over time. In this longitudinal, prospective analysis of exacerbations in the Subpopulations and Intermediate Outcome Measures in COPD Study (SPIROMICS) cohort, we analysed patients aged 40-80 years with COPD for whom 3 years of prospective data were available, identified through various means including care at academic and non-academic medical centres, word of mouth, and existing patient registries. Participants were enrolled in the study between Nov 12, 2010, and July 31, 2015. We classified patients according to yearly exacerbation frequency: no exacerbations in any year; one exacerbation in every year during 3 years of follow-up; and those with inconsistent exacerbations (individuals who had both years with exacerbations and years without during the 3 years of follow-up). Participants were characterised by the Global Initiative for Chronic Obstructive Lung Disease (GOLD) spirometric category (1-4) on the basis of post-bronchodilator FEV 1 . Stepwise logistic regression was used to compare factors associated with one or more acute exacerbations of COPD every year for 3 years versus no exacerbations in the same timeframe. Additionally, a stepwise zero-inflated negative binomial model was used to assess predictors of exacerbation count during follow-up in all patients with available data. Baseline symptom burden was assessed with the COPD assessment test. This trial is registered with ClinicalTrials.gov, number NCT01969344. 2981 patients were enrolled during the study. 1843 patients had COPD, of which 1105 patients had 3 years of complete, prospective follow-up data. 538 (49%) of 1105 patients had at least one acute exacerbation during the 3 years of follow-up, whereas

  2. Fine particulate matter in acute exacerbation of COPD

    Directory of Open Access Journals (Sweden)

    Lei eNi

    2015-10-01

    Full Text Available Chronic obstructive pulmonary disease (COPD is a common airway disorder. In particular, acute exacerbations of COPD (AECOPD can significantly reduce pulmonary function. The majority of AECOPD episodes are attributed to infections, although environmental stress also plays a role. Increasing urbanization and associated air pollution, especially in developing countries, have been shown to contribute to COPD pathogenesis. Elevated levels of particulate matter (PM in polluted air are strongly correlated with the onset and development of various respiratory diseases. In this review, we have conducted an extensive literature search of recent studies of the role of PM2.5 (fine PM in AECOPD. PM2.5 leads to AECOPD via inflammation, oxidative stress, immune dysfunction, and altered airway epithelial structure and microbiome. Reducing PM2.5 levels is a viable approach to lower AECOPD incidence, attenuate COPD progression and decrease the associated healthcare burden.

  3. [Etiological and exacerbation factors for COPD. Body weight loss].

    Science.gov (United States)

    Yokoyama, Akihito

    2016-05-01

    Hunger or malnutrition is not only a historical issue but also a current problem worldwide. Biological responses to hunger are evolutionary prepared in our body, including energy generation by degradation of body proteins. Extreme weight loss (malnutrition) can cause air space enlargement in human and rodents. However, the changes in rodents could be reversible, since refeeding could repair the pathology. On the other hand, weight loss is a common feature in patients with more severe COPD. Complex factors, such as increased energy consumption, decreased food uptake by low grade inflammation, socio-economic factors and so on, are involved in weight loss. Weight loss in patients with COPD also increases the risk of exacerbation, hospitalization, and death.

  4. Will climate change exacerbate water stress in Central Asia?

    DEFF Research Database (Denmark)

    Siegfried, Tobias; Bernauer, Thomas; Guiennet, Renaud

    2012-01-01

    the Soviet Union collapsed. Will climate change exacerbate water stress and thus conflicts? We have developed a coupled climate, land-ice and rainfall-runoff model for the Syr Darya to quantify impacts and show that climatic changes are likely to have consequences on runoff seasonality due to earlier snow......-melt. This will increase water stress in unregulated catchments because less water will be available for irrigation in the summer months. Threats from geohazards, above all glacier lake outbursts, are likely to increase as well. The area at highest risk is the densely populated, agriculturally productive, and politically......Millions of people in the geopolitically important region of Central Asia depend on water from snow- and glacier-melt driven international rivers, most of all the Syr Darya and Amu Darya. The riparian countries of these rivers have experienced recurring water allocation conflicts ever since...

  5. Ulcerative colitis: criteria and methods of prognosis of exacerbation

    Directory of Open Access Journals (Sweden)

    Kashkina E.l.

    2014-09-01

    Full Text Available Objective: research is devoted to the development of criteria and methods for prognosis of the next recurrence of exacerbation of ulcerative colitis (UC after the patient discharged from hospital. Material and Methods: During a period of a year 38 patients with UC were supervised. The criteria used in the prognosis of recurrence included results of the evaluation of quality of life (SF-36 questionnaire, the analysis of the autonomic nervous system (coefficient Hildebrant and Kerdo index and the level of stressful load procedure Holmes-Rage. Results. It has been established that the risk factors for recurrence include low quality of life on the scale of RP, SF and MH SF-36, the coefficient Hildebrant >5.6 units, Kerdo index 314 points. Conclusion: The obtained data have been processed by multivariate mathematical statistics and the obtained analytical expression allows to prognose the time of recurrence of ulcerative colitis.

  6. Predictive factors for moderate or severe exacerbations in asthma patients receiving outpatient care

    OpenAIRE

    Guti?rrez, Francisco Javier ?lvarez; Galv?n, Marta Ferrer; Gallardo, Juan Francisco Medina; Mancera, Marta Barrera; Romero, Beatriz Romero; Falc?n, Auxiliadora Romero

    2017-01-01

    Background Asthma exacerbations are important events that affect disease control, but predictive factors for severe or moderate exacerbations are not known. The objective was to study the predictive factors for moderate (ME) and severe (SE) exacerbations in asthma patients receiving outpatient care. Methods Patients aged?>?12?years with asthma were included in the study and followed-up at 4-monthly intervals over a 12-month period. Clinical (severity, level of control, asthma control test [AC...

  7. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  8. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  9. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  10. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  11. Exposure to particulate hexavalent chromium exacerbates allergic asthma pathology

    International Nuclear Information System (INIS)

    Schneider, Brent C.; Constant, Stephanie L.; Patierno, Steven R.; Jurjus, Rosalyn A.; Ceryak, Susan M.

    2012-01-01

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. -- Highlights: ► Allergic asthma correlated with exposure to certain inhaled particulate chromates. ► Direct causal association between Cr(VI) and allergic asthma not established. ► Cr exacerbated pathology and airway hyperresponsiveness in an OVA-challenged mouse. ► Particulate Cr

  12. Inflammation and airway microbiota during cystic fibrosis pulmonary exacerbations.

    Directory of Open Access Journals (Sweden)

    Edith T Zemanick

    Full Text Available Pulmonary exacerbations (PEx, frequently associated with airway infection and inflammation, are the leading cause of morbidity in cystic fibrosis (CF. Molecular microbiologic approaches detect complex microbiota from CF airway samples taken during PEx. The relationship between airway microbiota, inflammation, and lung function during CF PEx is not well understood.To determine the relationships between airway microbiota, inflammation, and lung function in CF subjects treated for PEx.Expectorated sputum and blood were collected and lung function testing performed in CF subjects during early (0-3d. and late treatment (>7d. for PEx. Sputum was analyzed by culture, pyrosequencing of 16S rRNA amplicons, and quantitative PCR for total and specific bacteria. Sputum IL-8 and neutrophil elastase (NE; and circulating C-reactive protein (CRP were measured.Thirty-seven sputum samples were collected from 21 CF subjects. At early treatment, lower diversity was associated with high relative abundance (RA of Pseudomonas (r = -0.67, p<0.001, decreased FEV(1% predicted (r = 0.49, p = 0.03 and increased CRP (r = -0.58, p = 0.01. In contrast to Pseudomonas, obligate and facultative anaerobic genera were associated with less inflammation and higher FEV₁. With treatment, Pseudomonas RA and P. aeruginosa by qPCR decreased while anaerobic genera showed marked variability in response. Change in RA of Prevotella was associated with more variability in FEV₁ response to treatment than Pseudomonas or Staphylococcus.Anaerobes identified from sputum by sequencing are associated with less inflammation and higher lung function compared to Pseudomonas at early exacerbation. CF PEx treatment results in variable changes of anaerobic genera suggesting the need for larger studies particularly of patients without traditional CF pathogens.

  13. Exposure to particulate hexavalent chromium exacerbates allergic asthma pathology

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Brent C. [Department of Microbiology, Immunology and Tropical Medicine, The George Washington University, Washington, DC 20037 (United States); Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States); Constant, Stephanie L. [Department of Microbiology, Immunology and Tropical Medicine, The George Washington University, Washington, DC 20037 (United States); Patierno, Steven R. [Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States); GW Cancer Institute, The George Washington University, Washington, DC 20037 (United States); Jurjus, Rosalyn A. [Department of Anatomy and Regenerative Biology, The George Washington University, Washington, DC 20037 (United States); Ceryak, Susan M., E-mail: phmsmc@gwumc.edu [Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States)

    2012-02-15

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. -- Highlights: ► Allergic asthma correlated with exposure to certain inhaled particulate chromates. ► Direct causal association between Cr(VI) and allergic asthma not established. ► Cr exacerbated pathology and airway hyperresponsiveness in an OVA-challenged mouse. ► Particulate Cr

  14. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  15. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  16. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  17. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  18. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  19. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  1. The Christmas Season as a Risk Factor for Chronic Obstructive Pulmonary Disease Exacerbations

    Directory of Open Access Journals (Sweden)

    Neil W Johnston

    2010-01-01

    Full Text Available BACKGROUND: Epidemics of hospitalization for chronic obstructive pulmonary disease (COPD occur annually during the Christmas holidays, and COPD exacerbations commonly coincide with respiratory viral infections.

  2. Impact and prevention of severe exacerbations of COPD: a review of the evidence

    Science.gov (United States)

    Halpin, David MG; Miravitlles, Marc; Metzdorf, Norbert; Celli, Bartolomé

    2017-01-01

    Severe exacerbations of COPD, ie, those leading to hospitalization, have profound clinical implications for patients and significant economic consequences for society. The prevalence and burden of severe COPD exacerbations remain high, despite recognition of the importance of exacerbation prevention and the availability of new treatment options. Severe COPD exacerbations are associated with high mortality, have negative impact on quality of life, are linked to cardiovascular complications, and are a significant burden on the health-care system. This review identified risk factors that contribute to the development of severe exacerbations, treatment options (bronchodilators, antibiotics, corticosteroids [CSs], oxygen therapy, and ventilator support) to manage severe exacerbations, and strategies to prevent readmission to hospital. Risk factors that are amenable to change have been highlighted. A number of bronchodilators have demonstrated successful reduction in risk of severe exacerbations, including long-acting muscarinic antagonist or long-acting β2-agonist mono- or combination therapies, in addition to vaccination, mucolytic and antibiotic therapy, and nonpharmacological interventions, such as pulmonary rehabilitation. Recognition of the importance of severe exacerbations is an essential step in improving outcomes for patients with COPD. Evidence-based approaches to prevent and manage severe exacerbations should be implemented as part of targeted strategies for disease management. PMID:29062228

  3. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  4. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  5. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  6. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  7. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  8. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  2. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  3. Bringing stability to the COPD patient: clinical and pharmacological considerations for frequent exacerbators

    Science.gov (United States)

    Gulati, Swati

    2017-01-01

    Acute exacerbations of chronic obstructive pulmonary disease (AECOPD) are critical events associated with accelerated loss of lung function, increased morbidity, and excess mortality. AECOPD are heterogeneous in nature and this may directly impact clinical decision making, specifically in patients with frequent exacerbations. A “frequent exacerbator” is a sub-phenotype of COPD that is defined as an individual who experiences ≥2 moderate to severe exacerbations per year. This distinct subgroup has higher mortality and account for more than half of COPD-related hospitalizations annually. Thus, it is imperative to identify individuals at risk for frequent exacerbations and choose optimal strategies to minimize risk for these events. New paradigms for utilizing combination inhalers and the introduction of novel oral compounds provide expanded treatment options to reduce the risk and frequency of exacerbations. The goals of managing frequent exacerbators or patients at risk for AECOPD are: 1) maximizing bronchodilation, 2) reducing inflammation, and 3) targeting specific molecular pathways implicated in COPD and AECOPD pathogenesis. Novel inhaler therapies include combination long acting muscarinic agents (LAMA) plus long acting beta agonists (LABA) show promising results compared to monotherapy or LABA inhaled corticosteroid (ICS) combination in reducing exacerbation risk among individuals at risk for exacerbations and among frequent exacerbators. Likewise, oral medications including macrolides and phosphodiesterase (PDE4) inhibitors reduce the risk for AECOPD in select groups of individuals at high risk for exacerbation. Future direction in COPD management is based on identification of various subtypes or “endotypes” and targeting therapies based on their pathophysiology. This review aims to describe the impact of AECOPD, challenges posed by frequent exacerbators, and explores the rationale for different pharmacologic approaches to preventing AECOPD in these

  4. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  6. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  7. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  8. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  9. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  10. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  11. Altered gene expression in blood and sputum in COPD frequent exacerbators in the ECLIPSE cohort.

    Directory of Open Access Journals (Sweden)

    Dave Singh

    Full Text Available Patients with chronic obstructive pulmonary disease (COPD who are defined as frequent exacerbators suffer with 2 or more exacerbations every year. The molecular mechanisms responsible for this phenotype are poorly understood. We investigated gene expression profile patterns associated with frequent exacerbations in sputum and blood cells in a well-characterised cohort. Samples from subjects from the ECLIPSE COPD cohort were used; sputum and blood samples from 138 subjects were used for microarray gene expression analysis, while blood samples from 438 subjects were used for polymerase chain reaction (PCR testing. Using microarray, 150 genes were differentially expressed in blood (>±1.5 fold change, p≤0.01 between frequent compared to non-exacerbators. In sputum cells, only 6 genes were differentially expressed. The differentially regulated genes in blood included downregulation of those involved in lymphocyte signalling and upregulation of pro-apoptotic signalling genes. Multivariate analysis of the microarray data followed by confirmatory PCR analysis identified 3 genes that predicted frequent exacerbations; B3GNT, LAF4 and ARHGEF10. The sensitivity and specificity of these 3 genes to predict the frequent exacerbator phenotype was 88% and 33% respectively. There are alterations in systemic immune function associated with frequent exacerbations; down-regulation of lymphocyte function and a shift towards pro-apoptosis mechanisms are apparent in patients with frequent exacerbations.

  12. A trial of beclomethasone/formoterol in COPD using EXACT-PRO to measure exacerbations

    DEFF Research Database (Denmark)

    Singh, Dave; Kampschulte, Jorg; Wedzicha, Jadwiga A

    2013-01-01

    -primary outcome, and the Exacerbations of Chronic Pulmonary Disease Tool (EXACT) means of collecting patient-reported outcome data are also being used to enhance the detection of exacerbation events. EXACT data are being collected using a novel application of a digital platform technology. FORWARD is therefore...

  13. Low-intensity noninvasive ventilation: Lower pressure, more exacerbations of chronic respiratory failure

    Directory of Open Access Journals (Sweden)

    Toru Kadowaki

    2016-01-01

    Conclusions: Attention should be paid to CRF patients who are initially administered LI-NPPV; they should be carefully observed because they can develop more exacerbations of CRF than patients undergoing C-NPPV. If possible, higher initial PS should be administered to prevent CRF exacerbations.

  14. Definitions of Exacerbations Does It Really Matter in Clinical Trials on COPD?

    NARCIS (Netherlands)

    Effing, Tanja W.; Kerstjens, Huib A. M.; Monninkhof, Evelyn M.; van der Valk, Paul D. L. P. M.; Wouters, Emiel F. M.; Postma, Dirkje S.; Zielhuis, Gerhard A.; van der Palen, Job

    Many definitions of COPD exacerbations are reported. The choice for a definition determines the number of exacerbations observed. However, the effect of different definitions on the effect sizes of randomized controlled trials is unclear. This article provides an overview of the large variation of

  15. Definitions of exacerbations: does it really matter in clinical trials on COPD?

    NARCIS (Netherlands)

    Effing-Tijdhof, T.W.; Kerstjens, H.A.; Monninkhof, E.M.; Valk, P.D.L.P.M. van der; Wouters, E.F.; Postma, D.S.; Zielhuis, G.A.; Palen, J.A.M. van der

    2009-01-01

    Many definitions of COPD exacerbations are reported. The choice for a definition determines the number of exacerbations observed. However, the effect of different definitions on the effect sizes of randomized controlled trials is unclear. This article provides an overview of the large variation of

  16. Case-fatality of COPD exacerbations: a meta-analysis and statistical modeling approach

    DEFF Research Database (Denmark)

    Hoogendoorn, M; Hoogenveen, R T; Rutten-van Mölken, M P

    2010-01-01

    's survival curve was divided into a critical and a stable period. Mortality during the stable period was then estimated by extrapolating the survival curve during the stable period back to the time of exacerbation onset. Case-fatality was defined as the excess mortality that results from an exacerbation...

  17. Psychological Factors and Pain Exacerbation in Knee Osteoarthritis : A Web Based Case-Crossover Study

    NARCIS (Netherlands)

    Erfani, Tahereh; Keefe, Francis; Bennell, Kim; Chen, J; Makovey, J; Metcalf, B; Williams, A.D.; Zhang, Y; Hunter, David

    2015-01-01

    OBJECTIVES: The pain experienced by osteoarthritis (OA) patients is neither constant nor unchanging and patients experience episodes of pain exacerbations. Using an innovative web based case-crossover design, we evaluated whether psychological factors are risk factors for pain exacerbations in

  18. COPD exacerbation: anthropometric characteristics of patients and the frequency of hospital admissions

    Directory of Open Access Journals (Sweden)

    Gashynova K.Y.

    2014-11-01

    Full Text Available Exceptional importance of exacerbations for COPD course prognosing was reflected in the GOLD, 2011, where the number of exacerbations during the past year has been recognized as one of the main criteria of the future risks for patients. The aim of study was to determine the anthropometric indicators that increase the risk of re-hospitalization due to acute exacerbation of COPD. A retrospective analysis of medical records of inpatients who were hospitalized with COPD exacerbation to therapeutic department of CI "Dnipropetrovs’k sixth municipal clinical hospital" of Dnipropetrovsk regional council" during three years was done. It was established that neither sex, nor height, nor weight affect the rate of hospitalization due to COPD exacerbations. Older age is not a factor that increases the risk of hospitalization due to COPD exacerbation (despite the fact that the majority of hospitalized patients were elderly patients, 37% of them were persons of potentially working age. Severe exacerbation of COPD may occur in any patients with, even one year, experience of the disease. Among anthropometric indices, the most important predictor of re-hospitalization due to exacerbation of COPD is BMI<18.5, so its calculation is advisable in long-term observation of patients.

  19. Treatment of exacerbations as a predictor of subsequent outcomes in patients with COPD

    Directory of Open Access Journals (Sweden)

    Calverley PMA

    2018-04-01

    Full Text Available Peter MA Calverley,1 Antonio R Anzueto,2 Daniel Dusser,3 Achim Mueller,4 Norbert Metzdorf,5 Robert A Wise6 1Clinical Science Centre, Institute of Ageing and Chronic Disease, University of Liverpool, Liverpool, UK; 2Pulmonary/Critical Care, University of Texas and South Texas Veterans Health Care System, San Antonio, TX, USA; 3Department of Pneumology, Hôpital Cochin, AP-HP, Université Paris Descartes, Sorbonne Paris Cité, Paris, France; 4Biostatistics and Data Sciences Europe, Boehringer Ingelheim Pharma GmbH & Co. KG, Biberach an der Riss, Germany; 5Respiratory Medicine, Boehringer Ingelheim Pharma GmbH & Co. KG, Ingelheim am Rhein, Germany; 6Division of Pulmonary and Critical Care Medicine, Department of Medicine, Johns Hopkins University School of Medicine, Baltimore, MD, USA Rationale: Exacerbations of COPD are managed differently, but whether treatment of one exacerbation predicts the likelihood of subsequent events is unknown. Objective: We examined whether the treatment given for exacerbations predicted subsequent outcomes. Methods: This was a post-hoc analysis of 17,135 patients with COPD from TIOtropium Safety and Performance In Respimat® (TIOSPIR®. Patients treated with tiotropium with one or more moderate to severe exacerbations on study were analyzed using descriptive statistics, logistic and Cox regression analysis, and Kaplan–Meier plots. Results: Of 8,061 patients with moderate to severe exacerbation(s, demographics were similar across patients with exacerbations treated with antibiotics and/or steroids or hospitalization. Exacerbations treated with systemic corticosteroids alone or in combination with antibiotics had the highest risk of subsequent exacerbation (HR: 1.21, P=0.0004 and HR: 1.33, P<0.0001, respectively, and a greater risk of having a hospitalized (severe exacerbation (HR: 1.59 and 1.63, P<0.0001, respectively or death (HR: 1.50, P=0.0059 and HR: 1.47, P=0.0002, respectively compared with exacerbations treated

  20. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  1. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  2. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  3. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  4. Statin use and exacerbations in individuals with chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Ingebrigtsen, Truls S; Marott, Jacob L; Nordestgaard, Børge G

    2015-01-01

    BACKGROUND: We tested the hypothesis that statin use in individuals with COPD is associated with a reduced risk of exacerbations. METHODS: We identified 5794 individuals with COPD and a measurement of C reactive protein (CRP) in the Copenhagen General Population Study (2003-2008). During 3 years...... of follow-up we recorded exacerbations with hospital admissions or oral corticosteroid treatment. In a nested case-control design, matching on age, gender, smoking, COPD severity and comorbidity, we estimated the association between statin use and exacerbations. In addition, we examined the association...... between statin use and high CRP (>3 mg/L), and the association between high CRP and exacerbations during follow-up. RESULTS: Statin use was associated with reduced odds of exacerbations in crude analysis, OR=0.68 (95% CI 0.51 to 0.91, p=0.01), as well as in multivariable conditional logistic regression...

  5. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  6. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  7. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  8. RIP3-dependent necrosis induced inflammation exacerbates atherosclerosis

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Lingjun, E-mail: menglingjun@nibs.ac.cn [College of Biological Sciences, China Agricultural University, Beijing 100094 (China); National Institute of Biological Sciences, Beijing 102206 (China); Jin, Wei [Institute for Immunology, Tsinghua University, Beijing 100084 (China); Wang, Yuhui [Institute of Cardiovascular Sciences, Health Science Center, Peking University, Beijing 100191 (China); Huang, Huanwei; Li, Jia; Zhang, Cai [National Institute of Biological Sciences, Beijing 102206 (China)

    2016-04-29

    Atherothrombotic vascular disease is already the leading cause of mortality worldwide. Atherosclerosis shares features with diseases caused by chronic inflammation. More attention should concentrates on the innate immunity effect atherosclerosis progress. RIP3 (receptor-interacting protein kinase 3) act through the transcription factor named Nr4a3 (Nuclear orphan receptors) to regulate cytokine production. Deletion RIP3 decreases IL-1α production. Injection of anti-IL-1α antibody protects against the progress of atherosclerosis in ApoE −/− mice. RIP3 as a molecular switch in necrosis, controls macrophage necrotic death caused inflammation. Inhibiting necrosis will certainly reduce atherosclerosis through limit inflammation. Necrotic cell death caused systemic inflammation exacerbated cardiovascular disease. Inhibition of necrosis may yield novel therapeutic targets for treatment in years to come. - Highlights: • RIP3 regulate the Nr4a3 to control cytokine production. • Deletion RIP3 decreases IL-1a production. • Injection anti-IL-1a antibody protects against the progress of atherosclerosis. • RIP3 controls macrophage necrotic dead caused inflammation.

  9. Influence of Pseudomonas aeruginosa on exacerbation in patients with bronchiectasis

    Directory of Open Access Journals (Sweden)

    Kiran Chawla

    2015-01-01

    Full Text Available Background: A majority of the studies done on the western population have shown that Pseudomonas aeruginosa causes many severe infections in patients with bronchiectasis as compared to other pathogens. There is scarcity of similar data from the Asian population. Materials and Methods: A prospective study was undertaken to identify the various pathogens isolated from the respiratory samples of 117 patients with bronchiectasis from south India and to compare the clinicomicrobiological profile of infections caused by P. aeruginosa and other respiratory pathogens. Results: The respiratory pathogens were isolated from 63 (53.8% patients. P. aeruginosa was the most common isolate (46.0% followed by Klebsiella pneumoniae (14.3% and other pathogenic bacteria. Patients included in the P. aeruginosa group had a higher number of exacerbations (p: 0.008, greater number of hospital admissions (p: 0.007, a prolonged hospital stay (p: 0.03, and poor lung function, compared to the patients infected with the non-Pseudomonas group. Conclusion: It is necessary to investigate the etiology of respiratory tract infections among bronchiectasis patients followed by the prompt management of cases diagnosed with P. aeruginosa infections, so as to lower the morbidity and have a better prognosis.

  10. COPD Exacerbation Biomarkers Validated Using Multiple Reaction Monitoring Mass Spectrometry.

    Directory of Open Access Journals (Sweden)

    Janice M Leung

    Full Text Available Acute exacerbations of chronic obstructive pulmonary disease (AECOPD result in considerable morbidity and mortality. However, there are no objective biomarkers to diagnose AECOPD.We used multiple reaction monitoring mass spectrometry to quantify 129 distinct proteins in plasma samples from patients with COPD. This analytical approach was first performed in a biomarker cohort of patients hospitalized with AECOPD (Cohort A, n = 72. Proteins differentially expressed between AECOPD and convalescent states were chosen using a false discovery rate 1.2. Protein selection and classifier building were performed using an elastic net logistic regression model. The performance of the biomarker panel was then tested in two independent AECOPD cohorts (Cohort B, n = 37, and Cohort C, n = 109 using leave-pair-out cross-validation methods.Five proteins were identified distinguishing AECOPD and convalescent states in Cohort A. Biomarker scores derived from this model were significantly higher during AECOPD than in the convalescent state in the discovery cohort (p<0.001. The receiver operating characteristic cross-validation area under the curve (CV-AUC statistic was 0.73 in Cohort A, while in the replication cohorts the CV-AUC was 0.77 for Cohort B and 0.79 for Cohort C.A panel of five biomarkers shows promise in distinguishing AECOPD from convalescence and may provide the basis for a clinical blood test to diagnose AECOPD. Further validation in larger cohorts is necessary for future clinical translation.

  11. [Possibility of exacerbation of allergy by lunar regolith].

    Science.gov (United States)

    Horie, Masanori; Kambara, Tatsunori; Kuroda, Etsushi; Miki, Takeo; Honma, Yoshiyuki; Aoki, Shigeru; Morimoto, Yasuo

    2012-09-01

    Japan, U.S.A. and other foreign space agencies have plans for the construction of a lunar base and long-term stay of astronauts on the moon. The surface of the moon is covered by a thick layer of soil that includes fine particles called "lunar regolith", which is formed by meteorite impact and space weathering. Risk assessment of particulate matter on the moon is important for astronauts working in microgravity on the moon. However, there are few investigations about the biological influences of lunar regolith. Especially, there is no investigation about allergic activity to lunar regolith. The main chemical components of lunar regolith are SiO2, Al2O3, CaO, FeO, etc. Of particular interest, approximately 50% of lunar regolith consists of SiO2. There is a report that the astronauts felt hay fever-like symptoms from the inhalation of the lunar regolith. Yellow sand, whose chemical components are similar to lunar regolith, enhances allergenic reactions, suggesting the possibility that lunar regolith has an adjuvant-like activity. Although intraperitoneal administration of lunar regolith with ovalbumin to mouse did not show enhancement of allergenic reactions, further evaluation of lunar regolith's potential to exacerbate the effects of allergies is essential for development of the moon.

  12. Virus Infections on Prion Diseased Mice Exacerbate Inflammatory Microglial Response

    Science.gov (United States)

    Lins, Nara; Mourão, Luiz; Trévia, Nonata; Passos, Aline; Farias, José Augusto; Assunção, Jarila; Bento-Torres, João; Consentino Kronka Sosthenes, Marcia; Diniz, José Antonio Picanço; Vasconcelos, Pedro Fernando da Costa

    2016-01-01

    We investigated possible interaction between an arbovirus infection and the ME7 induced mice prion disease. C57BL/6, females, 6-week-old, were submitted to a bilateral intrahippocampal injection of ME7 prion strain (ME7) or normal brain homogenate (NBH). After injections, animals were organized into two groups: NBH (n = 26) and ME7 (n = 29). At 15th week after injections (wpi), animals were challenged intranasally with a suspension of Piry arbovirus 0.001% or with NBH. Behavioral changes in ME7 animals appeared in burrowing activity at 14 wpi. Hyperactivity on open field test, errors on rod bridge, and time reduction in inverted screen were detected at 15th, 19th, and 20th wpi respectively. Burrowing was more sensitive to earlier hippocampus dysfunction. However, Piry-infection did not significantly affect the already ongoing burrowing decline in the ME7-treated mice. After behavioral tests, brains were processed for IBA1, protease-resistant form of PrP, and Piry virus antigens. Although virus infection in isolation did not change the number of microglia in CA1, virus infection in prion diseased mice (at 17th wpi) induced changes in number and morphology of microglia in a laminar-dependent way. We suggest that virus infection exacerbates microglial inflammatory response to a greater degree in prion-infected mice, and this is not necessarily correlated with hippocampal-dependent behavioral deficits. PMID:28003864

  13. Infection with Porphyromonas gingivalis exacerbates endothelial injury in obese mice.

    Directory of Open Access Journals (Sweden)

    Min Ao

    Full Text Available BACKGROUND: A number of studies have revealed a link between chronic periodontitis and cardiovascular disease in obese patients. However, there is little information about the influence of periodontitis-associated bacteria, Porphyromonas gingivalis (Pg, on pathogenesis of atherosclerosis in obesity. METHODS: In vivo experiment: C57BL/6J mice were fed with a high-fat diet (HFD or normal chow diet (CD, as a control. Pg was infected from the pulp chamber. At 6 weeks post-infection, histological and immunohistochemical analysis of aortal tissues was performed. In vitro experiment: hTERT-immortalized human umbilical vein endothelial cells (HuhT1 were used to assess the effect of Pg/Pg-LPS on free fatty acid (FFA induced endothelial cells apoptosis and regulation of cytokine gene expression. RESULTS: Weaker staining of CD31 and increased numbers of TUNEL positive cells in aortal tissue of HFD mice indicated endothelial injury. Pg infection exacerbated the endothelial injury. Immunohistochemically, Pg was detected deep in the smooth muscle of the aorta, and the number of Pg cells in the aortal wall was higher in HFD mice than in CD mice. Moreover, in vitro, FFA treatment induced apoptosis in HuhT1 cells and exposure to Pg-LPS increased this effect. In addition, Pg and Pg-LPS both attenuated cytokine production in HuhT1 cells stimulated by palmitate. CONCLUSIONS: Dental infection of Pg may contribute to pathogenesis of atherosclerosis by accelerating FFA-induced endothelial injury.

  14. Increasing temperature exacerbated Classic Maya conflict over the long term

    Science.gov (United States)

    Carleton, W. Christopher; Campbell, David; Collard, Mark

    2017-05-01

    The impact of climate change on conflict is an important but controversial topic. One issue that needs to be resolved is whether or not climate change exacerbates conflict over the long term. With this in mind, we investigated the relationship between climate change and conflict among Classic Maya polities over a period of several hundred years (363-888 CE). We compiled a list of conflicts recorded on dated monuments, and then located published temperature and rainfall records for the region. Subsequently, we used a recently developed time-series method to investigate the impact of the climatic variables on the frequency of conflict while controlling for trends in monument number. We found that there was a substantial increase in conflict in the approximately 500 years covered by the dataset. This increase could not be explained by change in the amount of rainfall. In contrast, the increase was strongly associated with an increase in summer temperature. These finding have implications not only for Classic Maya history but also for the debate about the likely effects of contemporary climate change.

  15. RIP3-dependent necrosis induced inflammation exacerbates atherosclerosis

    International Nuclear Information System (INIS)

    Meng, Lingjun; Jin, Wei; Wang, Yuhui; Huang, Huanwei; Li, Jia; Zhang, Cai

    2016-01-01

    Atherothrombotic vascular disease is already the leading cause of mortality worldwide. Atherosclerosis shares features with diseases caused by chronic inflammation. More attention should concentrates on the innate immunity effect atherosclerosis progress. RIP3 (receptor-interacting protein kinase 3) act through the transcription factor named Nr4a3 (Nuclear orphan receptors) to regulate cytokine production. Deletion RIP3 decreases IL-1α production. Injection of anti-IL-1α antibody protects against the progress of atherosclerosis in ApoE −/− mice. RIP3 as a molecular switch in necrosis, controls macrophage necrotic death caused inflammation. Inhibiting necrosis will certainly reduce atherosclerosis through limit inflammation. Necrotic cell death caused systemic inflammation exacerbated cardiovascular disease. Inhibition of necrosis may yield novel therapeutic targets for treatment in years to come. - Highlights: • RIP3 regulate the Nr4a3 to control cytokine production. • Deletion RIP3 decreases IL-1a production. • Injection anti-IL-1a antibody protects against the progress of atherosclerosis. • RIP3 controls macrophage necrotic dead caused inflammation.

  16. Asymmetry in acute exacerbation of idiopathic pulmonary fibrosis

    Directory of Open Access Journals (Sweden)

    Akihiko Sokai

    2017-04-01

    Full Text Available Acute exacerbation (AE of idiopathic pulmonary fibrosis (IPF results in poor survival. The objective of the present study was to elucidate the impact of asymmetrical ground-glass opacity (GGO and/or consolidation on outcomes in patients with AE-IPF. The cases of 59 consecutive patients with AE-IPF were retrospectively reviewed. High-resolution computed tomography (HRCT at diagnosis of an AE was assessed to determine the disease extent and asymmetry. Asymmetrical AE was defined as a right-to-left ratio of GGO and consolidation ≥2.0 or ≤0.5. The impacts of HRCT indices and other clinical parameters on 180-day mortality were analysed. The overall 180-day mortality rate was 59.2%, and asymmetrical AE was observed in 13 patients (22.0%. A multivariate analysis revealed that asymmetrical AE was a significant predictor of 180-day mortality (hazard ratio=0.36, p=0.047, long-term oxygen therapy before AE and serum lactate dehydrogenase levels. The 180-day mortality of patients with asymmetrical AE was significantly lower than that of patients with symmetrical AE (asymmetrical AE 30.8% versus symmetrical AE 68.2%, p=0.03. An asymmetrical distribution of GGO and/or consolidation is a predictor of survival in patients with AE-IPF.

  17. Inflammatory Responses, Spirometry, and Quality of Life in Subjects With Bronchiectasis Exacerbations.

    Science.gov (United States)

    Guan, Wei-Jie; Gao, Yong-Hua; Xu, Gang; Lin, Zhi-Ya; Tang, Yan; Li, Hui-Min; Lin, Zhi-Min; Jiang, Mei; Zheng, Jin-Ping; Chen, Rong-Chang; Zhong, Nan-Shan

    2015-08-01

    Bronchiectasis exacerbations are critical events characterized by worsened symptoms and signs (ie, cough frequency, sputum volume, malaise). Our goal was to examine variations in airway and systemic inflammation, spirometry, and quality of life during steady state, bronchiectasis exacerbations, and convalescence (1 week following a 2-week antibiotic treatment) to determine whether potentially pathogenic microorganisms, including Pseudomonas aeruginosa, were associated with poorer conditions during bronchiectasis exacerbations. Peripheral blood and sputum were sampled to detect inflammatory mediators and bacterial densities. Spirometry and quality of life (St George Respiratory Questionnaire [SGRQ]) were assessed during the 3 stages. Forty-eight subjects with bronchiectasis (43.2 ± 14.2 y of age) were analyzed. No notable differences in species and density of potentially pathogenic microorganisms were found during bronchiectasis exacerbations. Except for CXCL8 and tumor necrosis factor alpha (TNF-α), serum inflammation was heightened during bronchiectasis exacerbations and recovered during convalescence. Even though sputum TNF-α was markedly higher during bronchiectasis exacerbations and remained heightened during convalescence, the variations in miscellaneous sputum markers were unremarkable. Bronchiectasis exacerbations were associated with notably higher SGRQ symptom and total scores, which recovered during convalescence. FVC, FEV1, and maximum mid-expiratory flow worsened during bronchiectasis exacerbations (median change from baseline of -2.2%, -0.8%, and -1.3%) and recovered during convalescence (median change from baseline of 0.6%, 0.7%, and -0.7%). Compared with no bacterial isolation, potentially pathogenic microorganism or P. aeruginosa isolation at baseline did not result in poorer clinical condition during bronchiectasis exacerbations. Bronchiectasis exacerbations are characterized by heightened inflammatory responses and poorer quality of life and

  18. Long-term future risk of severe exacerbations: Distinct 5-year trajectories of problematic asthma.

    Science.gov (United States)

    Yii, A C A; Tan, J H Y; Lapperre, T S; Chan, A K W; Low, S Y; Ong, T H; Tan, K L; Chotirmall, S H; Sterk, P J; Koh, M S

    2017-09-01

    Assessing future risk of exacerbations is an important component of asthma management. Existing studies have investigated short- but not long-term risk. Problematic asthma patients with unfavorable long-term disease trajectory and persistently frequent severe exacerbations need to be identified early to guide treatment. To identify distinct trajectories of severe exacerbation rates among "problematic asthma" patients and develop a risk score to predict the most unfavorable trajectory. Severe exacerbation rates over five years for 177 "problematic asthma" patients presenting to a specialist asthma clinic were tracked. Distinct trajectories of severe exacerbation rates were identified using group-based trajectory modeling. Baseline predictors of trajectory were identified and used to develop a clinical risk score for predicting the most unfavorable trajectory. Three distinct trajectories were found: 58.5% had rare intermittent severe exacerbations ("infrequent"), 32.0% had frequent severe exacerbations at baseline but improved subsequently ("nonpersistently frequent"), and 9.5% exhibited persistently frequent severe exacerbations, with the highest incidence of near-fatal asthma ("persistently frequent"). A clinical risk score composed of ≥2 severe exacerbations in the past year (+2 points), history of near-fatal asthma (+1 point), body mass index ≥25kg/m 2 (+1 point), obstructive sleep apnea (+1 point), gastroesophageal reflux (+1 point), and depression (+1 point) was predictive of the "persistently frequent" trajectory (area under the receiver operating characteristic curve: 0.84, sensitivity 72.2%, specificity 81.1% using cutoff ≥3 points). The trajectories and clinical risk score had excellent performance in an independent validation cohort. Patients with problematic asthma follow distinct illness trajectories over a period of five years. We have derived and validated a clinical risk score that accurately identifies patients who will have persistently

  19. Impact and prevention of severe exacerbations of COPD: a review of the evidence

    Directory of Open Access Journals (Sweden)

    Halpin DMG

    2017-10-01

    Full Text Available David MG Halpin,1 Marc Miravitlles,2 Norbert Metzdorf,3 Bartolomé Celli4 1Department of Respiratory Medicine, Royal Devon and Exeter Hospital, Exeter, UK; 2Pneumology Department, Hospital Universitari Vall d’Hebron, CIBER de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 3Respiratory Medicine, Boehringer Ingelheim Pharma GmBH & Co KG, Ingelheim am Rhein, Germany; 4Pulmonary Division, Brigham and Women’s Hospital, Boston, MA, USA Abstract: Severe exacerbations of COPD, ie, those leading to hospitalization, have profound clinical implications for patients and significant economic consequences for society. The prevalence and burden of severe COPD exacerbations remain high, despite recognition of the importance of exacerbation prevention and the availability of new treatment options. Severe COPD exacerbations are associated with high mortality, have negative impact on quality of life, are linked to cardiovascular complications, and are a significant burden on the health-care system. This review identified risk factors that contribute to the development of severe exacerbations, treatment options (bronchodilators, antibiotics, corticosteroids [CSs], oxygen therapy, and ventilator support to manage severe exacerbations, and strategies to prevent readmission to hospital. Risk factors that are amenable to change have been highlighted. A number of bronchodilators have demonstrated successful reduction in risk of severe exacerbations, including long-acting muscarinic antagonist or long-acting β2-agonist mono- or combination therapies, in addition to vaccination, mucolytic and antibiotic therapy, and nonpharmacological interventions, such as pulmonary rehabilitation. Recognition of the importance of severe exacerbations is an essential step in improving outcomes for patients with COPD. Evidence-based approaches to prevent and manage severe exacerbations should be implemented as part of targeted strategies for disease management. Keywords

  20. Exacerbations of COPD and symptoms of gastroesophageal reflux: a systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Thiago Mamoru Sakae

    2013-06-01

    Full Text Available OBJECTIVE: To examine the relationship between gastroesophageal reflux (GER and COPD exacerbations. METHODS: We conducted a systematic search of various electronic databases for articles published up through December of 2012. Studies considered eligible for inclusion were those dealing with COPD, COPD exacerbations, and GER; comparing at least two groups (COPD vs. controls or GER vs. controls; and describing relative risks (RRs and prevalence ratios-or ORs and their respective 95% CIs (or presenting enough data to allow further calculations for the association between GER and COPD-as well as exacerbation rates. Using a standardized form, we extracted data related to the study design; criteria for GER diagnosis; age, gender, and number of participants; randomization method; severity scores; methods of evaluating GER symptoms; criteria for defining exacerbations; exacerbation rates (hospitalizations, ER visits, unscheduled clinic visits, prednisone use, and antibiotic use; GER symptoms in COPD group vs. controls; mean number of COPD exacerbations (with symptoms vs. without symptoms; annual frequency of exacerbations; GER treatment; and severity of airflow obstruction. RESULTS: Overall, GER was clearly identified as a risk factor for COPD exacerbations (RR = 7.57; 95% CI: 3.84-14.94, with an increased mean number of exacerbations per year (mean difference: 0.79; 95% CI: 0.22-1.36. The prevalence of GER was significantly higher in patients with COPD than in those without (RR = 13.06; 95% CI: 3.64-46.87; p < 0.001. CONCLUSIONS: GER is a risk factor for COPD exacerbations. The role of GER in COPD management should be studied in greater detail.

  1. Tiotropium and Salmeterol in COPD Patients at Risk of Exacerbations: A Post Hoc Analysis from POET-COPD(®).

    Science.gov (United States)

    Vogelmeier, Claus F; Asijee, Guus M; Kupas, Katrin; Beeh, Kai M

    2015-06-01

    Among patients with chronic obstructive pulmonary disease (COPD), the frequency and severity of past exacerbations potentiates future events. The impact of current therapies on exacerbation frequency and severity in patients with different exacerbation risks is not well known. A post hoc analysis of patients at low (≤1 exacerbation [oral steroids/antibiotics requirement] and no COPD-related hospitalization in the year preceding trial entry) or high (≥2 exacerbations [oral steroids/antibiotics requirement] or ≥1 COPD-related hospitalization[s] in the year preceding trial entry) exacerbation risk, from the Prevention of Exacerbations with Tiotropium in Chronic Obstructive Pulmonary Disease (POET-COPD(®)) database. Compared with salmeterol, tiotropium significantly increased time to first COPD exacerbation (hazard ratio 0.84; 95% confidence interval [CI] 0.76-0.92; p = 0.0002) and reduced the number of COPD exacerbations (rate ratio 0.90; 95% CI 0.81-0.99; p = 0.0383) in patients at high exacerbation risk. With treatment, the risk of remaining in the high-risk exacerbator subgroup was statistically lower with tiotropium versus salmeterol (risk ratio [RR] 0.89; 95% CI 0.80-1.00; p = 0.0478). For low-risk patients, time to first COPD exacerbation and number of COPD exacerbations were numerically lower with tiotropium versus salmeterol. With treatment, the risk of transitioning from a low to a high exacerbation risk was lower with tiotropium versus salmeterol (RR 0.87; 95% CI 0.71-1.07; p = 0.1968). This analysis confirms the higher efficacy of tiotropium versus salmeterol in prolonging time to first COPD exacerbation and reducing number of exacerbations in patients both at low and high exacerbation risk. Boehringer Ingelheim and Pfizer. ClinicalTrials.gov NCT00563381.

  2. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  3. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  4. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  5. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  7. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  8. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  9. How do we diagnose and treat epilepsy with myoclonic-atonic seizures (Doose syndrome)? Results of the Pediatric Epilepsy Research Consortium survey.

    Science.gov (United States)

    Nickels, Katherine; Thibert, Ronald; Rau, Stephanie; Demarest, Scott; Wirrell, Elaine; Kossoff, Eric H; Joshi, Charuta; Nangia, Srishti; Shellhaas, Renee

    2018-04-25

    To obtain and assess opinions on EMAS diagnostic criteria, recommended investigations, and therapeutic options, from a large group of physicians who care for children with EMAS. The EMAS focus group of PERC created a survey to assess the opinions of pediatric neurologists who care for children with EMAS regarding diagnosis and treatment of this condition, which was sent to members of PERC, AES, and CNS. A Likert scale was used to assess the respondents' opinions on the importance of diagnostic and exclusion criteria (five point scale), investigations (four point scale), and treatment (six point scale) of EMAS. Inclusion/exclusion criteria were then classified as critical, strong, or modest. Investigations were classified as essential, recommended, or possible. Therapies were classified as first line, beneficial, indeterminate benefit, or contraindicated. Survey results from the 76 participants determined the following: EMAS inclusion criteria: history suggestive of MAS (critical), recorded or home video suggestive of MAS, generalized discharges on inter-ictal EEG, normal neuroimaging, normal development prior to seizure onset (strong). EMAS exclusionary criteria: epileptic spasms, abnormal neuroimaging, focal abnormal exam, seizure onset six years (strong). EEG and MRI (essential), amino acids, organic acids, fatty acid/acylcarnitine profile, microarray, genetic panel, lactate/pyruvate, CSF and serum glucose/lactate (strong). Valproic acid (first line), topiramate, zonisamide, levetiracetam, benzodiazepines, and dietary therapies (beneficial). To date, no similar surveys have been published, even though early syndrome identification and initiation of effective treatment have been associated with improved outcome in EMAS. Medications that exacerbate seizures in EMAS have also been identified. This survey identified critical and preferred diagnostic electro clinical features, investigations, and treatments for EMAS. It will guide future research and is a crucial

  10. Preventing and managing exacerbations in COPD – critical appraisal of the role of tiotropium

    Directory of Open Access Journals (Sweden)

    Donald P Tashkin

    2010-02-01

    Full Text Available Donald P TashkinDepartment of Medicine, Division of Pulmonary and Critical Care Medicine, David Geffen School of Medicine at UCLA,Los Angeles, CA, USAAbstract: The course of COPD is punctuated by acute exacerbations that are associated with an increase in the morbidity and mortality related to this chronic disease and may contribute to its rate of progression. Therefore, preventing and treating exacerbations are major goals of COPD management. The role of tiotropium in the prevention of exacerbations has been investigated in several placebo-controlled randomized clinical trials varying in duration from 3 months to 4 years in patients with moderate to very severe COPD. In all of these trials, tiotropium has uniformly reduced the proportion of patients experiencing at least one exacerbation and delayed the time to the first exacerbation compared with placebo. In the longer trials (≥6 months’ duration tiotropium has also reduced the exposure-adjusted incidence rate of exacerbations. In trials of at least 1 year in duration, tiotropium either significantly reduced the risk of hospitalization for an exacerbation and/or the proportion of patients with an exacerbation-related hospitalization. In a meta-analysis that included 15 trials of tiotropium vs either placebo (n = 13 and/or a longacting beta-agonist (LABA; n = 4, tiotropium significantly reduced the odds of experiencing an exacerbation compared to placebo as well as a LABA. The potential additive benefits of tiotropium to those of a LABA and/or inhaled corticosteroid in reducing exacerbations require further investigation. The mechanism whereby tiotropium reduces exacerbations is not due to an anti-inflammatory effect but more likely relates to its property of causing a sustained increase in airway patency and reduction in hyperinflation, thereby counteracting the tendency for respiratory insults to worsen airflow obstruction and hyperinflation. For the management of acute exacerbations, an

  11. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  12. Exposure to Particulate Hexavalent Chromium Exacerbates Allergic Asthma Pathology

    Science.gov (United States)

    Schneider, Brent C.; Constant, Stephanie L.; Patierno, Steven R.; Jurjus, Rosalyn A.; Ceryak, Susan M.

    2011-01-01

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. PMID:22178736

  13. Cannabis exacerbates depressive symptoms in rat model induced by reserpine.

    Science.gov (United States)

    Khadrawy, Yasser A; Sawie, Hussein G; Abdel-Salam, Omar M E; Hosny, Eman N

    2017-05-01

    Cannabis sativa is one of the most widely recreational drugs and its use is more prevalent among depressed patients. Some studies reported that Cannabis has antidepressant effects while others showed increased depressive symptoms in Cannabis users. Therefore, the present study aims to investigate the effect of Cannabis extract on the depressive-like rats. Twenty four rats were divided into: control, rat model of depression induced by reserpine and depressive-like rats treated with Cannabis sativa extract (10mg/kg expressed as Δ9-tetrahydrocannabinol). The depressive-like rats showed a severe decrease in motor activity as assessed by open field test (OFT). This was accompanied by a decrease in monoamine levels and a significant increase in acetylcholinesterase activity in the cortex and hippocampus. Na + ,K + -ATPase activity increased in the cortex and decreased in the hippocampus of rat model. In addition, a state of oxidative stress was evident in the two brain regions. This was indicated from the significant increase in the levels of lipid peroxidation and nitric oxide. No signs of improvement were observed in the behavioral and neurochemical analyses in the depressive-like rats treated with Cannabis extract. Furthermore, Cannabis extract exacerbated the lipid peroxidation in the cortex and hippocampus. According to the present findings, it could be concluded that Cannabis sativa aggravates the motor deficits and neurochemical changes induced in the cortex and hippocampus of rat model of depression. Therefore, the obtained results could explain the reported increase in the depressive symptoms and memory impairment among Cannabis users. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Right ventricular function during acute exacerbation of severe equine asthma.

    Science.gov (United States)

    Decloedt, A; Borowicz, H; Slowikowska, M; Chiers, K; van Loon, G; Niedzwiedz, A

    2017-09-01

    Pulmonary hypertension has been described in horses with severe equine asthma, but its effect on the right ventricle has not been fully elucidated. To evaluate right ventricular structure and function after a 1-week period of pulmonary hypertension secondary to acute exacerbation of severe equine asthma. Prospective study. A clinical episode of severe equine asthma was induced experimentally in six susceptible horses. Examinations in remission and on day 7 of the clinical episode included a physical examination with clinical scoring, echocardiography, arterial blood gas measurements, venous blood sampling for cardiac biomarkers, intracardiac pressure measurements, right ventricular and right atrial myocardial biopsies, airway endoscopy and bronchoalveolar lavage. After 1 month of recovery, physical examination, echocardiography and cardiac biomarker analysis were repeated. Echocardiographic and pressure measurements were compared with those in 10 healthy control horses. All horses developed clinical signs of acute pulmonary obstruction. Right heart pressures increased significantly. Altered right ventricular function could be detected by tissue Doppler and speckle tracking echocardiography. Cardiac troponin concentrations did not increase significantly, but were highly elevated in one horse which exercised in the paddock prior to sampling. Focal neutrophil infiltration was present in two myocardial samples. Even in remission, asthmatic horses showed a thicker right ventricular wall, an increased left ventricular end-systolic eccentricity index at chordal level and decreased right ventricular longitudinal strain compared with controls. The induced clinical episode was rather mild and the number of horses was limited because of the invasive nature of the study. Pulmonary obstruction in asthmatic horses induces pulmonary hypertension with right ventricular structural and functional changes. © 2017 EVJ Ltd.

  15. Exacerbation of acetaminophen hepatotoxicity by the anthelmentic drug fenbendazole.

    Science.gov (United States)

    Gardner, Carol R; Mishin, Vladimir; Laskin, Jeffrey D; Laskin, Debra L

    2012-02-01

    Fenbendazole is a broad-spectrum anthelmintic drug widely used to prevent or treat nematode infections in laboratory rodent colonies. Potential interactions between fenbendazole and hepatotoxicants such as acetaminophen are unknown, and this was investigated in this study. Mice were fed a control diet or a diet containing fenbendazole (8-12 mg/kg/day) for 7 days prior to treatment with acetaminophen (300 mg/kg) or phosphate buffered saline. In mice fed a control diet, acetaminophen administration resulted in centrilobular hepatic necrosis and increases in serum transaminases, which were evident within 12 h. Acetaminophen-induced hepatotoxicity was markedly increased in mice fed the fenbendazole-containing diet, as measured histologically and by significant increases in serum transaminase levels. Moreover, in mice fed the fenbendazole-containing diet, but not the control diet, 63% mortality was observed within 24 h of acetaminophen administration. Fenbendazole by itself had no effect on liver histology or serum transaminases. To determine if exaggerated hepatotoxicity was due to alterations in acetaminophen metabolism, we analyzed sera for the presence of free acetaminophen and acetaminophen-glucuronide. We found that there were no differences in acetaminophen turnover. We also measured cytochrome P450 (cyp) 2e1, cyp3a, and cyp1a2 activity. Whereas fenbendazole had no effect on the activity of cyp2e1 or cyp3a, cyp1a2 was suppressed. A prolonged suppression of hepatic glutathione (GSH) was also observed in acetaminophen-treated mice fed the fenbendazole-containing diet when compared with the control diet. These data demonstrate that fenbendazole exacerbates the hepatotoxicity of acetaminophen, an effect that is related to persistent GSH depletion. These findings are novel and suggest a potential drug-drug interaction that should be considered in experimental protocols evaluating mechanisms of hepatotoxicity in rodent colonies treated with fenbendazole.

  16. Aversive stimuli exacerbate defensive motor behaviour in motor conversion disorder.

    Science.gov (United States)

    Blakemore, Rebekah L; Sinanaj, Indrit; Galli, Silvio; Aybek, Selma; Vuilleumier, Patrik

    2016-12-01

    Conversion disorder or functional neurological symptom disorder (FND) can affect the voluntary motor system, without an organic cause. Functional symptoms are thought to be generated unconsciously, arising from underlying psychological stressors. However, attempts to demonstrate a direct relationship between the limbic system and disrupted motor function in FND are lacking. We tested whether negative affect would exacerbate alterations of motor control and corresponding brain activations in individuals with FND. Ten patients and ten healthy controls produced an isometric precision-grip contraction at 10% of maximum force while either viewing visual feedback of their force output, or unpleasant or pleasant emotional images (without feedback). Force magnitude was continuously recorded together with change in brain activity using fMRI. For controls, force output decayed from the target level while viewing pleasant and unpleasant images. Patients however, maintained force at the target level without decay while viewing unpleasant images, indicating a pronounced effect of negative affect on force output in FND. This emotional modulation of force control was associated with different brain activation patterns between groups. Contrasting the unpleasant with the pleasant condition, controls showed increased activity in the inferior frontal cortex and pre-supplementary motor area, whereas patients had greater activity in the cerebellum (vermis), posterior cingulate cortex, and hippocampus. Engagement of a cerebellar-limbic network in patients is consistent with heightened processing of emotional salience, and supports the role of the cerebellum in freezing responses in the presence of aversive events. These data highlight a possible neural circuit through which psychological stressors elicit defensive behaviour and modulate motor function in FND. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Monitoring of Physiological Parameters to Predict Exacerbations of Chronic Obstructive Pulmonary Disease (COPD: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Ahmed M. Al Rajeh

    2016-11-01

    Full Text Available Introduction: The value of monitoring physiological parameters to predict chronic obstructive pulmonary disease (COPD exacerbations is controversial. A few studies have suggested benefit from domiciliary monitoring of vital signs, and/or lung function but there is no existing systematic review. Objectives: To conduct a systematic review of the effectiveness of monitoring physiological parameters to predict COPD exacerbation. Methods: An electronic systematic search compliant with Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA guidelines was conducted. The search was updated to April 6, 2016. Five databases were examined: Medical Literature Analysis and Retrieval System Online, or MEDLARS Online (Medline, Excerpta Medica dataBASE (Embase, Allied and Complementary Medicine Database (AMED, Cumulative Index of Nursing and Allied Health Literature (CINAHL and the Cochrane clinical trials database. Results: Sixteen articles met the pre-specified inclusion criteria. Fifteen of these articules reported positive results in predicting COPD exacerbation via monitoring of physiological parameters. Nine studies showed a reduction in peripheral oxygen saturation (SpO2% prior to exacerbation onset. Three studies for peak flow, and two studies for respiratory rate reported a significant variation prior to or at exacerbation onset. A particular challenge is accounting for baseline heterogeneity in parameters between patients. Conclusion: There is currently insufficient information on how physiological parameters vary prior to exacerbation to support routine domiciliary monitoring for the prediction of exacerbations in COPD. However, the method remains promising.

  18. Changes in ventilation-perfusion during and after an COPD exacerbation : an assessment using fluid dynamic modeling

    NARCIS (Netherlands)

    Hajian, Bita; De Backer, Jan; Vos, Wim; van Geffen, Wouter H; De Winter, Paul; Usmani, Omar; Cahn, Tony; Kerstjens, Huib Am; Pistolesi, Massimo; De Backer, Wilfried

    2018-01-01

    Introduction: Severe exacerbations associated with chronic obstructive pulmonary disease (COPD) that require hospitalization significantly contribute to morbidity and mortality. Definitions for exacerbations are very broad, and it is unclear whether there is one predominant underlying mechanism that

  19. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  20. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  1. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  2. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  3. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  4. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  5. Exacerbations of chronic obstructive pulmonary disease: when are antibiotics indicated? A systematic review

    Directory of Open Access Journals (Sweden)

    Steurer Johann

    2007-04-01

    Full Text Available Abstract Background For decades, there is an unresolved debate about adequate prescription of antibiotics for patients suffering from exacerbations of chronic obstructive pulmonary disease (COPD. The aim of this systematic review was to analyse randomised controlled trials investigating the clinical benefit of antibiotics for COPD exacerbations. Methods We conducted a systematic review of randomised, placebo-controlled trials assessing the effects of antibiotics on clinically relevant outcomes in patients with an exacerbation. We searched bibliographic databases, scrutinized reference lists and conference proceedings and asked the pharmaceutical industry for unpublished data. We used fixed-effects models to pool results. The primary outcome was treatment failure of COPD exacerbation treatment. Results We included 13 trials (1557 patients of moderate to good quality. For the effects of antibiotics on treatment failure there was much heterogeneity across all trials (I2 = 82%. Meta-regression revealed severity of exacerbation as significant explanation for this heterogeneity (p = 0.016: Antibiotics did not reduce treatment failures in outpatients with mild to moderate exacerbations (pooled odds ratio 1.09, 95% CI 0.75–1.59, I2 = 18%. Inpatients with severe exacerbations had a substantial benefit on treatment failure rates (pooled odds ratio of 0.25, 95% CI 0.16–0.39, I2 = 0%; number-needed to treat of 4, 95% CI 3–5 and on mortality (pooled odds ratio of 0.20, 95% CI 0.06–0.62, I2 = 0%; number-needed to treat of 14, 95% CI 12–30. Conclusion Antibiotics effectively reduce treatment failure and mortality rates in COPD patients with severe exacerbations. For patients with mild to moderate exacerbations, antibiotics may not be generally indicated and further research is needed to guide antibiotic prescription in these patients.

  6. The reliability and validity of patient-reported chronic obstructive pulmonary disease exacerbations.

    Science.gov (United States)

    Mohan, Arjun; Sethi, Sanjay

    2014-03-01

    Despite the increasing awareness of their pathogenesis and clinical consequences, research on and clinical management of acute exacerbations of chronic obstructive lung disease (AECOPDs) have been hindered by the lack of a consistent and reliable definition. Symptom-based definitions of exacerbations are sensitive to events and account for unreported exacerbations. Event (healthcare utilization)-based definitions are somewhat more definitive but miss unreported events. Objective quantification of symptoms in AECOPD is now possible with the development of the Exacerbations of Chronic Obstructive Pulmonary Disease Tool (EXACT-PRO), a patient-reported outcome (PRO) measure. Several studies have revealed that unreported AECOPDs are more frequent than reported events and are associated with long-term adverse consequences. New antibiotic development for AECOPD has been hampered by the lack of validated measures for resolution of exacerbations. As a result of these observations, a unique collaborative effort between academia, industry and regulatory agencies resulted in the development of the EXACT-PRO. It consists of 14 questions that generate a score between 0 and 100, and it has been shown to have excellent reliability and validity. In the absence of a reliable biomarker, the definition and measurement of exacerbations has been subjective and imprecise. PRO measures such as EXACT can provide much needed objectivity in assessing symptom-defined exacerbations, which may translate into a uniform outcome measure in clinical trials. With further development and validation, it may have a role in clinical practice in the earlier detection of exacerbations, stratification of an exacerbation severity and the assessment of clinical response to treatment.

  7. Plasma sCD14 as a biomarker to predict pulmonary exacerbations in cystic fibrosis.

    Directory of Open Access Journals (Sweden)

    Bradley S Quon

    Full Text Available BACKGROUND: One in four cystic fibrosis (CF patients diagnosed with a pulmonary exacerbation will not recover their baseline lung function despite standard treatment. This highlights the importance of preventing such events. Clinical decision-making can be improved through a simple blood test that predicts individuals at elevated short-term risk of an exacerbation. METHODS: We obtained plasma samples from 30 stable CF patients from the St. Paul's Hospital Adult CF Clinic (Vancouver, Canada. For 15 patients, an additional plasma sample was obtained during an exacerbation. Soluble CD14 (sCD14 and C-reactive protein (CRP were quantified using ELISA kits. Myeloperoxidase (MPO, interleukin(IL-6, IL-1β, monocyte chemoattractant protein-1 (MCP-1, vascular endothelial growth factor (VEGF, and granulocyte colony-stimulating factor (G-CSF were quantified using Luminex™ immunoassays. Stable state biomarker levels were examined in their ability to predict individuals that would experience a pulmonary exacerbation requiring intravenous (IV antibiotics within 4 months. Paired stable and exacerbation plasma biomarker levels were also compared. RESULTS: sCD14 levels were significantly higher in patients that experienced a pulmonary exacerbation requiring IV antibiotics within 4 months (p = 0.001. sCD14 cut-off value of 1450 ng/mL was associated with an area under the curve of 0.91 (95% CI 0.83-0.99 for predicting an exacerbation within 4 months of a stable visit, with a sensitivity of 100% and specificity of 82%. Plasma sCD14 levels were significantly higher during exacerbations than during periods of clinical stability (p = 0.03. CONCLUSIONS: Plasma sCD14 is a promising biomarker for identifying CF patients who will exacerbate within 4 months of a stable visit but requires further study in larger, independent cohorts.

  8. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  9. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  11. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  12. Viruses and bacteria in acute asthma exacerbations - A GA(2) LEN-DARE* systematic review

    DEFF Research Database (Denmark)

    Papadopoulos, N G; Christodoulou, I; Rohde, G

    2011-01-01

    and sensitive methodologies. This systematic review summarizes current knowledge and developments in infection epidemiology of acute asthma in children and adults, describing the known impact for each individual agent and highlighting knowledge gaps. Among infectious agents, human rhinoviruses are the most...... and bacteria in acute asthma exacerbations - A GA(2) LEN-DARE systematic review. Allergy 2010; DOI: 10.1111/j.1398-9995.2010.02505.x. ABSTRACT: A major part of the burden of asthma is caused by acute exacerbations. Exacerbations have been strongly and consistently associated with respiratory infections...

  13. Pulmonary artery enlargement and cystic fibrosis pulmonary exacerbations: a cohort study

    Science.gov (United States)

    Wells, J. Michael; Farris, Roopan F.; Gosdin, Taylor A.; Dransfield, Mark T.; Wood, Michelle E.; Bell, Scott C.; Rowe, Steven M.

    2017-01-01

    Background Acute pulmonary exacerbations are associated with progressive lung function decline and increased mortality in cystic fibrosis (CF). The role of pulmonary vascular disease in pulmonary exacerbations is unknown. We investigated the association between pulmonary artery enlargement (PA:A>1), a marker of pulmonary vascular disease, and exacerbations. Methods We analyzed clinical, computed tomography (CT), and prospective exacerbation data in a derivation cohort of 74 adult CF patients, measuring the PA:A at the level of the PA bifurcation. We then replicated our findings in a validation cohort of 190 adult CF patients. Patients were separated into groups based on the presence or absence of a PA:A>1 and were followed for 1-year in the derivation cohort and 2-years in the validation cohort. The primary endpoint was developing ≥1 acute pulmonary exacerbation during follow-up. Linear and logistic regression models were used to determine associations between clinical factors, the PA:A ratio, and pulmonary exacerbations. We used Cox regression to determine time to first exacerbation in the validation cohort. Findings We found that PA:A>1 was present in n=37/74 (50%) of the derivation and n=89/190 (47%) of the validation cohort. In the derivation cohort, n=50/74 (68%) had ≥1 exacerbation at 1 year and n=133/190 (70%) in the validation cohort had ≥1 exacerbation after 2 years. PA:A>1 was associated with younger age in both cohorts and with elevated sweat chloride (100.5±10.9 versus 90.4±19.9mmol/L, difference between groups 10.1mmol/L [95%CI 2.5–17.7], P=0.017) in the derivation group. PA:A>1 was associated with exacerbations in the derivation (OR 3.49, 95%CI 1.18–10.3, P=0.023) and validation (OR 2.41, 95%CI 1.06–5.52, P=0.037) cohorts when adjusted for confounders. Time to first exacerbation was shorter in PA:A>1 versus PA:Apulmonary exacerbation risk in two well-characterized cohorts. PA:A may be a predictive marker in CF. PMID:27298019

  14. Clinical assessment, staging, and epidemiology of chronic obstructive pulmonary disease exacerbations

    DEFF Research Database (Denmark)

    Vestbo, Jørgen

    2006-01-01

    Patients presenting with an exacerbation of chronic obstructive pulmonary disease (COPD) are initially assessed to ensure that a proper diagnosis has been made and that relevant differential diagnoses are excluded. Although guidelines provide indicators for use, very little systematic research has...... been done in initial assessment of COPD exacerbations. Next, the assessment should aim at stratifying patients for risk of poor outcome. For this, predictors of poor prognosis as well as knowledge of favorable treatments can be used. However, no formal and validated staging system exists today. Given...... the frequency and impact of COPD exacerbations, there seems to be a need for systematic research in this area....

  15. Statistical analysis of exacerbation rates in COPD: TRISTAN and ISOLDE revisited

    DEFF Research Database (Denmark)

    Keene, O N; Calverley, P M A; Jones, P W

    2008-01-01

    different analysis methods, we have reanalysed data from two large studies which, among other objectives, investigated the effectiveness of inhaled corticosteroids in reducing COPD exacerbation rates. Using the negative binomial model to reanalyse data from the TRISTAN and ISOLDE studies, the overall...... estimates of exacerbation rates on each treatment arm are higher and the confidence intervals for comparisons between treatments are wider, but the overall conclusions of TRISTAN and ISOLDE regarding reduction of exacerbations remain unchanged. The negative binomial approach appears to provide a better fit...

  16. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  17. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  18. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  19. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  20. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  1. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  2. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  3. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  4. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  5. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  6. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  7. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  9. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  10. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  11. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  12. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  13. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  14. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  15. Why Mountain Pine Beetle Exacerbates a Principal-agent Relationship: Exploring Strategic Policy Responses to Beetle Attack in a Mixed Species Forest

    NARCIS (Netherlands)

    Bogle, T.; Kooten, van G.C.

    2012-01-01

    The management of public forestland is often carried out by private forest companies, in which case the landowner needs to exercise care in dealing with catastrophic natural disturbance. We use the mountain pine beetle (Dendroctonus ponderosae Hopkins, 1902) damage in British Columbia to explore how

  16. Management and prevention of chronic obstructive pulmonary disease exacerbations: a state of the art review

    Directory of Open Access Journals (Sweden)

    Wedzicha Jadwiga A

    2009-08-01

    Full Text Available Abstract Exacerbations of chronic obstructive pulmonary disease (COPD are important events in the natural history of this prevalent and devastating condition. This review provides a concise, state of the art summary on prevention and management of exacerbations. Considerable new data underpins evidence in support of many preventative interventions, pharmacological and non-pharmacological, that are now available. Challenges remain in developing new approaches, and delivering those that already exist to the right patient at the right time. Management of an exacerbation remains stepwise according to clinical severity, but there is now additional focus on addressing comorbidities and taking the opportunity at acute events to optimise preventative strategies for the future. Ultimately, exacerbations are heterogeneous events in a heterogeneous disease, and an individualised approach is paramount.

  17. Home-Based Telehealth Hospitalization for Exacerbation of Chronic Obstructive Pulmonary Disease

    DEFF Research Database (Denmark)

    Jakobsen, Anna Svarre; Laursen, Lars C; Rydahl-Hansen, Susan

    2015-01-01

    Background: Telehealth interventions for patients with chronic obstructive pulmonary disease (COPD) have focused primarily on stable outpatients. Telehealth designed to handle the acute exacerbation that normally requires hospitalization could also be of interest. The aim of this study...... was to compare the effect of home-based telehealth hospitalization with conventional hospitalization for exacerbation in severe COPD. Materials and Methods: A two-center, noninferiority, randomized, controlled effectiveness trial was conducted between June 2010 and December 2011. Patients with severe COPD...... admitted because of exacerbation were randomized 1:1 either to home-based telehealth hospitalization or to continue standard treatment and care at the hospital. The primary outcome was treatment failure defined as re-admission due to exacerbation in COPD within 30 days after initial discharge...

  18. Seasonality and determinants of moderate and severe COPD exacerbations in the TORCH study

    DEFF Research Database (Denmark)

    Jenkins, C R; Celli, B; Anderson, J A

    2012-01-01

    We investigated the impact of season relative to other determinants of chronic obstructive pulmonary disease (COPD) exacerbation frequency in a long-term international study of patients with forced expiratory volume in 1 s (FEV(1))...

  19. Study of plasma orexin-A level in COPD patients during acute exacerbation

    Directory of Open Access Journals (Sweden)

    Magdy M. Omar

    2017-10-01

    Conclusion: Patients with COPD during acute exacerbation had higher values of plasma orexin-A when compared with normal subjects and plasma orexin-A correlated positively with BMI and BFP in these patients.

  20. The Relationship Between 24-Hour Symptoms and COPD Exacerbations and Healthcare Resource Use

    DEFF Research Database (Denmark)

    Miravitlles, Marc; Worth, Heinrich; Soler-Cataluña, Juan José

    2016-01-01

    This observational study assessed the relationship between nighttime, early-morning and daytime chronic obstructive pulmonary disease (COPD) symptoms and exacerbations and healthcare resource use. COPD symptoms were assessed at baseline in patients with stable COPD using a standardised questionna...