WorldWideScience

Sample records for exacerbated myoclonic attacks

  1. Coherence analysis differentiates between cortical myoclonic tremor and essential tremor

    NARCIS (Netherlands)

    van Rootselaar, AF; Maurits, NM; Koelman, JHTM; van der Hoeven, JH; Bour, LJ; Leenders, KL; Brown, P; Tijssen, MAJ

    Familial cortical myoclonic tremor with epilepsy (FCMTE) is characterized by a distal kinetic tremor, infrequent epileptic attacks, and autosomal dominant inheritance. The tremor is thought to originate from the motor cortex. In our patient group, a premovement cortical spike Could not be

  2. Familial benign nonprogressive myoclonic epilepsies.

    Science.gov (United States)

    Striano, Pasquale; de Falco, Fabrizio A; Minetti, Carlo; Zara, Federico

    2009-05-01

    Work on the classification of epileptic syndromes is ongoing, and many syndromes are still under discussion. In particular, special difficulty still persists in correctly classifying epilepsies with myoclonic seizures. The existence of special familial epileptic syndromes primarily showing myoclonic features has been recently suggested on the basis of a clear pattern of inheritance or on the identification of new chromosomal genetic loci linked to the disease. These forms in development include familial infantile myoclonic epilepsy (FIME), benign adult familial myoclonic epilepsy (BAFME), or autosomal dominant cortical myoclonus and epilepsy (ADCME), and, maybe, adult-onset myoclonic epilepsy (AME). In the future, the identification of responsible genes and the protein products will contribute to our understanding of the molecular pathways of epileptogenesis and provide neurobiologic criteria for the classification of epilepsies, beyond the different phenotypic expression.

  3. Unconsciousness, automatisms, and myoclonic jerks with diffuse rhythmic 9-Hz discharges.

    Science.gov (United States)

    Nadel, A; Waddell, G; Volow, M; Escueta, A V

    1975-09-01

    A 25-year-old man presented with seizures characterized by unconsciousness, automatic behavior, and myoclonic jerks lasting 0.5 to 8 sec. Videotape analysis of 300 simultaneously recorded electroencephalographic and clinical attacks revealed 8- to 9-Hz 150 to 200 muV sharp waves beginning in both medial temporal areas during eyelid flutters. When discharges spread diffusely on both sides and lasted 2 to 3 sec, 20 degrees forward flexion of the head, unconsciousness, pupil dilation, and staring became evident. Asymmetrical myoclonic jerks invariably appeared. When paroxysms were greater than 3 sec, automatisms and tonic posturing occurred. The electroencephalographic and clinical seizures appeared during the awake and relaxed states, i.e., with normal alpha rhythm. They were suppressed during physical and mental activities and during sleep, i.e., in the absence of alpha rhythm. Our studies suggest that these seizures associated with diffuse electroencephalographic alpha-like activities are subcortical in origin and should be tested in their responsivity to alpha suppressants and inducers.

  4. Homozygous TBC1D24 mutation in two siblings with familial infantile myoclonic epilepsy (FIME) and moderate intellectual disability.

    Science.gov (United States)

    Poulat, Anne-Lise; Ville, Dorothée; de Bellescize, Julitta; André-Obadia, Nathalie; Cacciagli, Pierre; Milh, Mathieu; Villard, Laurent; Lesca, Gaetan

    2015-03-01

    Mutations in the TBC1D24 gene were first reported in an Italian family with a unique epileptic phenotype consisting of drug-responsive, early-onset idiopathic myoclonic seizures. Patients presented with isolated bilateral or focal myoclonia, which could evolve to long-lasting attacks without loss of consciousness, with a peculiar reflex component, and were associated with generalized tonic-clonic seizures. This entity was named "familial infantile myoclonic epilepsy" (FIME). More recently, TBC1D24 mutations have been shown to cause a variable range of disorders, including epilepsy of various seizure types and severity, non-syndromic deafness, and DOORS syndrome. We report on the electro-clinical features of two brothers, born to first-cousin parents, affected with infantile-onset myoclonic epilepsy. The peculiar epileptic presentation prompted us to perform direct sequencing of the TBC1D24 gene. The patients had very early onset of focal myoclonic fits with variable topography, lasting a few minutes to several hours, without loss of consciousness, which frequently evolved to generalized myoclonus or myoclonic status. Reflex myoclonia were noticed in one patient. Neurological outcome was marked by moderate intellectual disability. Despite the high frequency of seizures, repeated EEG recordings showed normal background rhythm and rare interictal spikes and waves. We found a homozygous missense mutation, c.457G>A/p.Glu153Lys, in the two affected brothers. This observation combined with recent data from the literature, suggest that mutations in TBCD24 cause a pathological continuum, with FIME at the "benign" end and severe drug-refractory epileptic encephalopathy on the severe end. Early-onset myoclonic epilepsy with focal and generalized myoclonic seizures is a common characteristic of this continuum. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Genetics Home Reference: spinal muscular atrophy with progressive myoclonic epilepsy

    Science.gov (United States)

    ... myoclonic epilepsy Spinal muscular atrophy with progressive myoclonic epilepsy Printable PDF Open All Close All Enable Javascript ... boxes. Description Spinal muscular atrophy with progressive myoclonic epilepsy (SMA-PME) is a neurological condition that causes ...

  6. Myoclonic epilepsy with ragged-red fibers without increased lactate levels.

    Science.gov (United States)

    Kimura, Shigemi; Ozasa, Shiro; Nakamura, Kyoko; Nomura, Keiko; Kosuge, Hirofumi

    2009-07-01

    Myoclonic epilepsy associated with ragged-red fibers is one of the mitochondrial encephalomyopathies. Pathogenic mitochondrial DNA mutations have been identified in the mitochondrial transfer RNA (tRNA)(Lys) at positions 8344 and 8356. Characteristics of myoclonic epilepsy associated with ragged-red fibers include myoclonic epilepsy, generalized epilepsy, hearing loss, exercise intolerance, lactic acidosis, and ragged-red fibers. The elevated lactate level is one of the most important symptoms needed to make a diagnosis of mitochondrial encephalomyopathy. In the present case, however, myoclonic epilepsy was associated with ragged-red fibers but without increased lactate levels. Therefore, myoclonic epilepsy associated with ragged-red fibers should be suspected in a patient who has myoclonic epilepsy that is difficult to control with antiepileptic medications and who has other symptoms of mitochondrial disease, such as mental retardation, even if the patient's lactate level is normal.

  7. Frontal lobe epilepsy may present as myoclonic seizures.

    Science.gov (United States)

    Cho, Yong Won; Yi, Sang Doe; Motamedi, Gholam K

    2010-04-01

    We describe a patient with seizures arising from right anterior-inferior frontal lobe presenting as myoclonic epilepsy. A 19-year-old man had experienced frequent paroxysmal bilateral myoclonic jerks involving his upper arms, shoulders, neck, and upper trunk since the age of 10. His baseline EEG showed intermittent right frontal spikes, and his ictal EEG showed rhythmic sharp theta discharges in the same area. MRI revealed cortical dysplasia in the right inferior frontal gyrus, and ictal-interictal SPECT analysis by SPM showed increased signal abnormality in this region. Diffusion tensor imaging (DTI) showed defects in fasciculi in the same area. These findings suggest that frontal lobe epilepsy should be considered in some patients with myoclonic seizures. Copyright (c) 2010 Elsevier Inc. All rights reserved.

  8. Late onset myoclonic epilepsy in Down syndrome and dementia

    Directory of Open Access Journals (Sweden)

    Annapia Verri

    2012-09-01

    Full Text Available Specific forms of epilepsy may be found at various ages in Down Syndrome (DS and a sharp increase in the incidence of epilepsy with age has been documented. A specific type of myoclonic epilepsy associated with cognitive decline has been reported as “senile myoclonic epilepsy” or “late onset myoclonic epilepsy in DS” (LOMEDS. We report a new case of LOMEDS, documented by clinical and neurophysiological evaluation and psychometric assessment (DSDS and DMR. MF, male, affected by DS, was referred in 2004 at 40 years of age; he had no personal or familial history of epilepsy. Since one year, the patient presented cognitive deterioration, characterized by regression of language abilities, loss of memory, and loss of sphincters control. A brain TC showed mild brainstem and sub-cortical atrophy. In 2006, myoclonic jerks involving upper limbs occurred mainly after awakening. EEG showed a low voltage 8 Hz background activity with diffuse slow activity, intermingled with spikes or polyspikes, persisting during NREM sleep. MF was initially treated with clonazepam and after with topiramate, resulting in partial seizures control. MRI (2008 demonstrated diffuse brain atrophy, associated with marked ventricular enlargement. At the psychometric evaluation, onset of dementia was evident late in 2004, with transition to the middle stage in 2006. Last assessment (2009 showed the clinical signs of a late stage of deterioration, with loss of verbal abilities and autonomous ambulation. Using levetiracetam till 2,000 mg/die, myoclonic jerks decreased but are still present every day after awakening. On the EEG slow and poorly organized background activity with bilateral polyspike-wave discharges was recorded. Therefore, we documented a parallel progression of dementia and myoclonic epilepsy in a DS subject.

  9. Myoclonic Jerks and Schizophreniform Syndrome: Case Report and Literature Review

    Directory of Open Access Journals (Sweden)

    Dominique Endres

    2018-05-01

    Full Text Available Background: Schizophreniform syndromes can be divided into primary idiopathic forms as well as different secondary organic subgroups (e.g., paraepileptic, epileptic, immunological, or degenerative. Secondary epileptic explanatory approaches have often been discussed in the past, due to the high rates of electroencephalography (EEG alterations in patients with schizophrenia. In particular, temporal lobe epilepsy is known to be associated with schizophreniform symptoms in well-described constellations. In the literature, juvenile myoclonic epilepsy has been linked to emotionally unstable personality traits, depression, anxiety, and executive dysfunction; however, the association with schizophrenia is largely unclear.Case presentation: We present the case of a 28-year-old male student suffering from mild myoclonic jerks, mainly of the upper limbs, as well as a predominant paranoid-hallucinatory syndrome with attention deficits, problems with working memory, depressive-flat mood, reduced energy, fast stimulus satiation, delusional and audible thoughts, tactile hallucinations, thought inspirations, and severe sleep disturbances. Cerebral magnetic resonance imaging and cerebrospinal fluid analyses revealed no relevant abnormalities. The routine EEG and the first EEG after sleep deprivation (under treatment with oxazepam also returned normal findings. Video telemetry over one night, which included a partial sleep-deprivation EEG, displayed short generalized spike-wave complexes and polyspikes, associated with myoclonic jerks, after waking in the morning. Video-EEG monitoring over 5 days showed over 100 myoclonic jerks of the upper limbs, frequently with generalized spike-wave complexes with left or right accentuation. Therefore, we diagnosed juvenile myoclonic epilepsy.Discussion: This case report illustrates the importance of extended EEG diagnostics in patients with schizophreniform syndromes and myoclonic jerks. The schizophreniform symptoms in the

  10. Myoclonic Jerks and Schizophreniform Syndrome: Case Report and Literature Review.

    Science.gov (United States)

    Endres, Dominique; Altenmüller, Dirk-M; Feige, Bernd; Maier, Simon J; Nickel, Kathrin; Hellwig, Sabine; Rausch, Jördis; Ziegler, Christiane; Domschke, Katharina; Doerr, John P; Egger, Karl; Tebartz van Elst, Ludger

    2018-01-01

    Background: Schizophreniform syndromes can be divided into primary idiopathic forms as well as different secondary organic subgroups (e.g., paraepileptic, epileptic, immunological, or degenerative). Secondary epileptic explanatory approaches have often been discussed in the past, due to the high rates of electroencephalography (EEG) alterations in patients with schizophrenia. In particular, temporal lobe epilepsy is known to be associated with schizophreniform symptoms in well-described constellations. In the literature, juvenile myoclonic epilepsy has been linked to emotionally unstable personality traits, depression, anxiety, and executive dysfunction; however, the association with schizophrenia is largely unclear. Case presentation: We present the case of a 28-year-old male student suffering from mild myoclonic jerks, mainly of the upper limbs, as well as a predominant paranoid-hallucinatory syndrome with attention deficits, problems with working memory, depressive-flat mood, reduced energy, fast stimulus satiation, delusional and audible thoughts, tactile hallucinations, thought inspirations, and severe sleep disturbances. Cerebral magnetic resonance imaging and cerebrospinal fluid analyses revealed no relevant abnormalities. The routine EEG and the first EEG after sleep deprivation (under treatment with oxazepam) also returned normal findings. Video telemetry over one night, which included a partial sleep-deprivation EEG, displayed short generalized spike-wave complexes and polyspikes, associated with myoclonic jerks, after waking in the morning. Video-EEG monitoring over 5 days showed over 100 myoclonic jerks of the upper limbs, frequently with generalized spike-wave complexes with left or right accentuation. Therefore, we diagnosed juvenile myoclonic epilepsy. Discussion: This case report illustrates the importance of extended EEG diagnostics in patients with schizophreniform syndromes and myoclonic jerks. The schizophreniform symptoms in the framework of

  11. The ketogenic diet in two paediatric patients with refractory myoclonic status epilepticus.

    Science.gov (United States)

    Caraballo, Roberto Horacio; Valenzuela, Gabriela Reyes; Armeno, Marisa; Fortini, Sebastian; Mestre, Graciela; Cresta, Araceli

    2015-12-01

    We describe two patients with refractory myoclonic status epilepticus treated with the ketogenic diet. Between May 1, 2014 and January 1, 2015, two patients who met the diagnostic criteria for refractory myoclonic status epilepticus, seen at our department, were placed on the ketogenic diet and followed for a minimum of six months. One patient with myoclonic epilepsy of unknown aetiology had a 75-90% seizure reduction, and the other with progressive encephalopathy associated with myoclonic epilepsy had a 50% seizure reduction. Both patients retained good tolerability for the diet. At the last control, one patient had isolated myoclonias and EEG showed occasional generalized spike-and-polyspike waves; the patient is now successfully attending kindergarten. The quality of life of the second patient improved significantly. In both cases, the number of antiepileptic drugs was reduced. The ketogenic diet is an effective and well-tolerated treatment option for patients with refractory myoclonic status epilepticus and should be considered earlier in the course of treatment.

  12. SLC6A1 Mutation and Ketogenic Diet in Epilepsy With Myoclonic-Atonic Seizures.

    Science.gov (United States)

    Palmer, Samantha; Towne, Meghan C; Pearl, Phillip L; Pelletier, Renee C; Genetti, Casie A; Shi, Jiahai; Beggs, Alan H; Agrawal, Pankaj B; Brownstein, Catherine A

    2016-11-01

    Epilepsy with myoclonic-atonic seizures, also known as myoclonic-astatic epilepsy or Doose syndrome, has been recently linked to variants in the SLC6A1 gene. Epilepsy with myoclonic-atonic seizures is often refractory to antiepileptic drugs, and the ketogenic diet is known for treating medically intractable seizures, although the mechanism of action is largely unknown. We report a novel SLC6A1 variant in a patient with epilepsy with myoclonic-atonic seizures, analyze its effects, and suggest a mechanism of action for the ketogenic diet. We describe a ten-year-old girl with epilepsy with myoclonic-atonic seizures and a de novo SLC6A1 mutation who responded well to the ketogenic diet. She carried a c.491G>A mutation predicted to cause p.Cys164Tyr amino acid change, which was identified using whole exome sequencing and confirmed by Sanger sequencing. High-resolution structural modeling was used to analyze the likely effects of the mutation. The SLC6A1 gene encodes a transporter that removes gamma-aminobutyric acid from the synaptic cleft. Mutations in SLC6A1 are known to disrupt the gamma-aminobutyric acid transporter protein 1, affecting gamma-aminobutyric acid levels and causing seizures. The p.Cys164Tyr variant found in our study has not been previously reported, expanding on the variants linked to epilepsy with myoclonic-atonic seizures. A 10-year-old girl with a novel SLC6A1 mutation and epilepsy with myoclonic-atonic seizures had an excellent clinical response to the ketogenic diet. An effect of the diet on gamma-aminobutyric acid reuptake mediated by gamma-aminobutyric acid transporter protein 1 is suggested. A personalized approach to epilepsy with myoclonic-atonic seizures patients carrying SLC6A1 mutation and a relationship between epilepsy with myoclonic-atonic seizures due to SLC6A1 mutations, GABAergic drugs, and the ketogenic diet warrants further exploration. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Viral attack exacerbates the susceptibility of a bloom-forming alga to ocean acidification.

    Science.gov (United States)

    Chen, Shanwen; Gao, Kunshan; Beardall, John

    2015-02-01

    Both ocean acidification and viral infection bring about changes in marine phytoplankton physiological activities and community composition. However, little information is available on how the relationship between phytoplankton and viruses may be affected by ocean acidification and what impacts this might have on photosynthesis-driven marine biological CO2 pump. Here, we show that when the harmful bloom alga Phaeocystis globosa is infected with viruses under future ocean conditions, its photosynthetic performance further decreased and cells became more susceptible to stressful light levels, showing enhanced photoinhibition and reduced carbon fixation, up-regulation of mitochondrial respiration and decreased virus burst size. Our results indicate that ocean acidification exacerbates the impacts of viral attack on P. globosa, which implies that, while ocean acidification directly influences marine primary producers, it may also affect them indirectly by altering their relationship with viruses. Therefore, viruses as a biotic stressor need to be invoked when considering the overall impacts of climate change on marine productivity and carbon sequestration. © 2014 John Wiley & Sons Ltd.

  14. Myoclonic epilepsy in Down syndrome and Alzheimer disease.

    Science.gov (United States)

    Aller-Alvarez, J S; Menéndez-González, M; Ribacoba-Montero, R; Salvado, M; Vega, V; Suárez-Moro, R; Sueiras, M; Toledo, M; Salas-Puig, J; Álvarez-Sabin, J

    2017-03-01

    Patients with Down syndrome (DS) who exhibit Alzheimer disease (AD) are associated with age. Both diseases with a common neuropathological basis have been associated with late-onset myoclonic epilepsy (LOMEDS). This entity presents electroencephalogram features as generalized polyspike-wave discharges. We present a series of 11 patients with the diagnosis of DS or AD who developed myoclonic seizures or generalized tonic-clonic seizures. In all cases, clinical and neuroimaging studies and polygraph EEG monitoring was performed. In all cases, cognitive impairment progressed quickly after the onset of epilepsy causing an increase in the degree of dependence. The most common finding in the EEG was a slowing of brain activity with theta and delta rhythms, plus intercritical generalized polyspike-waves were objectified in eight patients. In neuroimaging studies was found cerebral cortical atrophy. The most effective drug in this series was the levetiracetam. The association of generalized epilepsy with elderly DS represents an epiphenomenon in evolution which is associated with a progressive deterioration of cognitive and motor functions. This epilepsy has some electroclinical characteristics and behaves as progressive myoclonic epilepsy, which is probably related to the structural changes that characterize the evolutionary similarity of DS with AD. Recognition of this syndrome is important, since it has prognostic implications and requires proper treatment. Copyright © 2014 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  15. Association of the GRM4 gene variants with juvenile myoclonic ...

    Indian Academy of Sciences (India)

    out the genetic association study in an Indian population for ... Keywords. genetic risk factor; idiopathic generalized epilepsy; juvenile myoclonic epilepsy; metabotropic glutamate receptor; polygenic ..... JME cases, in a German population.

  16. Executive functions and psychiatric symptoms in drug-refractory juvenile myoclonic epilepsy.

    Science.gov (United States)

    Walsh, Jordana; Thomas, Rhys H; Church, Carla; Rees, Mark I; Marson, Anthony G; Baker, Gus A

    2014-06-01

    The pattern of executive dysfunction reported in juvenile myoclonic epilepsy (JME) resembles that of patients with cluster B personality disorders. This study examined whether executive dysfunction and maladaptive behavior reported in patients with JME are related. Sixty patients with drug-refractory JME were administered tests of intellect, memory, and executive dysfunction. Anxiety, depression, personality traits, impact of epilepsy, and perceived cognitive effects of antiepileptic drugs were measured. Half of the cohort exhibited moderate to severe anxiety symptoms. The patients performed most poorly on naming ability and inhibition switching. Duration of epilepsy exacerbated poor performance on inhibition switching. Females presented with pathological scores for neurotic and introvert traits and males for introvert traits. Abnormal personality traits and psychiatric disorders were associated with worse intellectual and executive functioning. People with extreme Eysenck Personality Scale - Brief Version (EPQ-BV) scores demonstrated the greatest level of executive impairment. Furthermore, the same degree of dysfunction was not seen in any individual with unremarkable EPQ-BV scores. This study indicates that specific patterns of executive dysfunction are related to maladaptive behavior in JME. Distinct behavioral patterns may be used to identify functional and anatomical differences between people with JME and for stratification to enable gene discovery. Copyright © 2014. Published by Elsevier Inc.

  17. Juvenile myoclonic epilepsy: clinical and EEG features

    DEFF Research Database (Denmark)

    Pedersen, S B; Petersen, K A

    1998-01-01

    We aimed to characterize the clinical profile and EEG features of 43 patients with juvenile myoclonic epilepsy. In a retrospective design we studied the records of, and re-interviewed, 43 patients diagnosed with JME from the epilepsy clinic data base. Furthermore, available EEGs were re...... were sleep deprivation (84%), stress (70%), and alcohol consumption (51%). EEG findings included rapid spike-wave and polyspike-wave....

  18. Juvenile myoclonic epilepsy: clinical and EEG features

    DEFF Research Database (Denmark)

    Pedersen, S B; Petersen, K A

    1998-01-01

    We aimed to characterize the clinical profile and EEG features of 43 patients with juvenile myoclonic epilepsy. In a retrospective design we studied the records of, and re-interviewed, 43 patients diagnosed with JME from the epilepsy clinic data base. Furthermore, available EEGs were re-evaluated...... were sleep deprivation (84%), stress (70%), and alcohol consumption (51%). EEG findings included rapid spike-wave and polyspike-wave....

  19. Asthma Exacerbation in Children: A Practical Review

    Directory of Open Access Journals (Sweden)

    Lin-Shien Fu

    2014-04-01

    Full Text Available Asthma is the most common chronic lower respiratory tract disease in childhood throughout the world. Despite advances in asthma management, acute exacerbations continue to be a major problem in patients and they result in a considerable burden on direct/indirect health care providers. A severe exacerbation occurring within 1 year is an independent risk factor. Respiratory tract viruses have emerged as the most frequent triggers of exacerbations in children. It is becoming increasingly clear that interactions may exist between viruses and other triggers, increasing the likelihood of an exacerbation. In this study, we provide an overview of current knowledge about asthma exacerbations, including its definition, impact on health care providers, and associated factors. Prevention management in intermittent asthma as well as intermittent wheeze in pre-school children and those with persistent asthma are discussed. Our review findings support the importance of controlling persistent asthma, as indicated in current guidelines. In addition, we found that early episodic intervention appeared to be crucial in preventing severe attacks and future exacerbations. Besides the use of medication, timely education after an exacerbation along with a comprehensive plan in follow up is also vitally important.

  20. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  1. Dextromethorphan in the treatment of early myoclonic encephalopathy evolving into migrating partial seizures in infancy

    Directory of Open Access Journals (Sweden)

    Yin-Hsuan Chien

    2012-05-01

    Full Text Available Epileptic encephalopathy with suppression-burst in electroencephalography (EEG can evolve into a few types of epileptic syndromes. We present here an unusual case of early myoclonic encephalopathy that evolved into migrating partial seizures in infancy. A female neonate initially had erratic myoclonus movements, hiccups, and a suppression-burst pattern in EEG that was compatible with early myoclonic encephalopathy. The seizures were controlled with dextromethorphan (20 mg/kg, and a suppression-burst pattern in EEG was reverted to relatively normal background activity. However, at 72 days of age, alternating focal tonic seizures, compatible with migrating partial seizures in infancy, were demonstrated by the 24-hour EEG recording. The seizures responded poorly to dextromethorphan. To our knowledge, this is the first reported case of early myoclonic encephalopathy evolving into migrating partial seizure in infancy. Whether it represents another age-dependent epilepsy evolution needs more clinical observation.

  2. Hyperconnectivity in juvenile myoclonic epilepsy: A network analysis

    Directory of Open Access Journals (Sweden)

    K. Caeyenberghs, PhD

    2015-01-01

    Conclusions: Our findings suggest that structural changes in JME patients are distributed at a network level, beyond the frontal lobes. The identified subnetwork includes key structures in spike wave generation, along with primary motor areas, which may contribute to myoclonic jerks. We conclude that analyzing the affected subnetworks may provide new insights into understanding seizure generation, as well as the cognitive deficits observed in JME patients.

  3. Interictal mood and personality disorders in temporal lobe epilepsy and juvenile myoclonic epilepsy.

    Science.gov (United States)

    Perini, G I; Tosin, C; Carraro, C; Bernasconi, G; Canevini, M P; Canger, R; Pellegrini, A; Testa, G

    1996-01-01

    BACKGROUND: Mood disorders have been described as the commonest psychiatric disorders in patients with temporal lobe epilepsy. Secondary depression in temporal lobe epilepsy could be interpreted either as an adjustment reaction to a chronic disease or as a limbic dysfunction. To clarify this issue, a controlled study of psychiatric disorders was conducted in different forms of epileptic and non-epileptic chronic conditions. METHODS: Twenty outpatients with temporal lobe epilepsy, 18 outpatients with juvenile myoclonic epilepsy--a primary generalised seizure disorder--20 matched type I diabetic patients, and 20 matched normal controls were assessed by a structured interview (SADS) and by self rating scales (Beck depression inventory (BDI) and the state and trait anxiety scales STAIX1 and STAIX2). RESULTS: Sixteen (80%) patients with temporal lobe epilepsy fulfilled the criteria for a psychiatric diagnosis at the SADS interview with a significantly higher frequency than patients with juvenile myoclonic epilepsy (22%) and diabetic patients (10%) (P personality or anxiety disorder. Patients with temporal lobe epilepsy scored significantly higher on BDI, STAIX1, and STAIX2 than the three control groups (P personality disorders, often in comorbidity, than patients with juvenile myoclonic epilepsy and diabetic patients suggesting that these psychiatric disorders are not an adjustment reaction to a chronic disease but rather reflect a limbic dysfunction. PMID:8971108

  4. Myoclonic encephalopathy after exposure to trichloroethylene.

    Science.gov (United States)

    Sanz, Pere; Nogué, Santiago; Vilchez, Daniel; Salvadó, Elisa; Casal, Amparo; Logroscino, Giancarlo

    2008-12-01

    Trichloroethylene is a widely-used industrial solvent that is absorbed through the digestive or respiratory tracts or cutaneously. It has a selective tropism for the cardiovascular and central nervous systems and may cause death due to cardiac arrest or neurological sequelae. We present the case of a 25-yr-old women who was exposed to trichloroethylene in the workplace for 18 months and who developed a disabling myoclonic encephalopathy. Non-toxicological causes were excluded. Although the exposure ceased, the disease progressed with thalamic and cerebellar involvement. The patient, who had only a partial response to symptomatic treatment, suffered severe limitations in the activities of daily living and was registered as permanently disabled due to a work-related disability.

  5. Analysis of Surgical Success in Preventing Recurrent Acute Exacerbations in Chronic Pancreatitis

    Science.gov (United States)

    Nealon, William H.; Matin, Sina

    2001-01-01

    Objective To determine whether surgical intervention prevents recurrent acute exacerbations in chronic pancreatitis (CP). Summary Background Data The primary goal of surgical intervention in the treatment of CP has been relief of chronic unrelenting abdominal pain. A subset of patients with CP have intermittent acute exacerbations, often with increasing frequency and often unrelated to ongoing ethanol abuse. Little data exist regarding the effectiveness of surgery to prevent acute attacks. Methods From 1985 to 1999, all patients identified with a diagnosis of CP were recruited to participate in an ongoing program of serial clinic visits and functional and clinical evaluations. Patients were offered surgery using standard criteria. Data were gathered regarding ethanol abuse, pain, narcotic use, and recurrent acute exacerbations requiring hospital admission before and after surgery. Patients were broadly categorized as having severe unrelenting pain alone (group 1), severe pain with intermittent acute exacerbations (group 2), and intermittent acute exacerbations only (group 3). Results Two hundred fifty-nine patients were recruited. One hundred eighty-five patients underwent 199 surgical procedures (124 modified Puestow procedure [LPJ], 29 distal pancreatectomies [DP], and 46 pancreatic head resections [PHR; 14 performed after failure of LPJ]). There were no deaths. The complication rate was 4% for LPJ, 15% for DP, and 27% for PHR. Ethanol abuse was causative in 238 patients (92%). Mean follow-up was 81 months. There were 104 patients in group 1 (86 who underwent surgery), 71 patients in group 2 (64 who underwent surgery), and 84 in group 3 (49 who underwent surgery). No patient without surgery had spontaneous resolution of symptoms. Postoperative pain relief (freedom from narcotic analgesics) was achieved in 153 of 185 patients (83%) overall: 106 of 124 (86%) for LPJ, 19 of 29 (67%) for DP, and 42 of 46 (91%) for PHR. The mean rate of acute exacerbations was 6.3

  6. Two siblings with early infantile myoclonic encephalopathy due to mutation in the gene encoding mitochondrial glutamate/H+ symporter SLC25A22.

    Science.gov (United States)

    Cohen, Rony; Basel-Vanagaite, Lina; Goldberg-Stern, Hadassah; Halevy, Ayelet; Shuper, Avinoam; Feingold-Zadok, Michal; Behar, Doron M; Straussberg, Rachel

    2014-11-01

    To characterize a new subset of early myoclonic encephalopathy usually associated with metabolic etiologies with a new genetic entity. We describe two siblings with early myoclonic encephalopathy born to consanguineous parents of Arab Muslim origin from Israel. We used homozygosity mapping and candidate gene sequencing to reveal the genetic basis of the myoclonic syndrome. We found a rare missense mutation in the gene encoding one of the two mitochondrial glutamate/H symporters, SLC25A22. The phenotype of early myoclonic encephalopathy was first linked to the same mutation in 2005 in patients of the same ethnicity as our family. Owing to the devastating nature of this encephalopathy, we focus attention on its clinical history, epileptic semiology, distinct electroencephalography features, and genetic basis. We provide the evidence that an integrated diagnostic strategy combining homozygosity mapping with candidate gene sequencing is efficient in consanguineous families with highly heterogeneous autosomal recessive diseases. Copyright © 2014 European Paediatric Neurology Society. Published by Elsevier Ltd. All rights reserved.

  7. Widespread cortical morphologic changes in juvenile myoclonic epilepsy: evidence from structural MRI.

    LENUS (Irish Health Repository)

    Ronan, Lisa

    2012-04-01

    Atypical morphology of the surface of the cerebral cortex may be related to abnormal cortical folding (gyrification) and therefore may indicate underlying malformations of cortical development (MCDs). Using magnetic resonance imaging (MRI)-based analysis, we examined cortical morphology in patients with juvenile myoclonic epilepsy (JME).

  8. Juvenile myoclonic epilepsy and narcolepsy: A series of three cases.

    Science.gov (United States)

    Joshi, Puja Aggarwal; Poduri, Annapurna; Kothare, Sanjeev V

    2015-10-01

    This paper sets out to demonstrate the coexistence of juvenile myoclonic epilepsy (JME) and narcolepsy that raises the possibility of a shared genetic predisposition to both conditions. The electronic medical records (EMRs) were searched for narcolepsy and JME over 10years. We identified three young adult women diagnosed with JME in their teenage years, with myoclonic, generalized tonic-clonic, and absence seizure semiologies, along with psychiatric comorbidity, well managed on lamotrigine and/or levetiracetam. Our patients were also found to have disturbed sleep preceding the diagnosis of JME by many years, including excessive daytime sleepiness (EDS), fragmented nocturnal sleep, hypnagogic vivid hallucinations, and REM behavior disorder along with daytime cataplexy. They were ultimately diagnosed with coexisting narcolepsy, confirmed by sleep studies and multiple sleep latency testing, along with positive genetic testing for HLA-DQB1*0602 in all three patients. Stimulants, selective serotonin receptor inhibitors, and/or sodium oxybate were used to successfully treat their narcolepsy. The coexistence of JME and narcolepsy has not been well recognized and may be clinically relevant. In addition, it raises the possibility of a shared genetic predisposition to both conditions. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Hyperconnectivity in juvenile myoclonic epilepsy: a network analysis.

    Science.gov (United States)

    Caeyenberghs, K; Powell, H W R; Thomas, R H; Brindley, L; Church, C; Evans, J; Muthukumaraswamy, S D; Jones, D K; Hamandi, K

    2015-01-01

    Juvenile myoclonic epilepsy (JME) is a common idiopathic (genetic) generalized epilepsy (IGE) syndrome characterized by impairments in executive and cognitive control, affecting independent living and psychosocial functioning. There is a growing consensus that JME is associated with abnormal function of diffuse brain networks, typically affecting frontal and fronto-thalamic areas. Using diffusion MRI and a graph theoretical analysis, we examined bivariate (network-based statistic) and multivariate (global and local) properties of structural brain networks in patients with JME (N = 34) and matched controls. Neuropsychological assessment was performed in a subgroup of 14 patients. Neuropsychometry revealed impaired visual memory and naming in JME patients despite a normal full scale IQ (mean = 98.6). Both JME patients and controls exhibited a small world topology in their white matter networks, with no significant differences in the global multivariate network properties between the groups. The network-based statistic approach identified one subnetwork of hyperconnectivity in the JME group, involving primary motor, parietal and subcortical regions. Finally, there was a significant positive correlation in structural connectivity with cognitive task performance. Our findings suggest that structural changes in JME patients are distributed at a network level, beyond the frontal lobes. The identified subnetwork includes key structures in spike wave generation, along with primary motor areas, which may contribute to myoclonic jerks. We conclude that analyzing the affected subnetworks may provide new insights into understanding seizure generation, as well as the cognitive deficits observed in JME patients.

  10. Familial Cortical Myoclonic Tremor with Epilepsy and Cerebellar Changes: Description of a New Pathology Case and Review of the Literature

    Directory of Open Access Journals (Sweden)

    Sarvi Sharifi

    2012-08-01

    Full Text Available Background: Over 60 Asian and European families with cortical myoclonic tremor and epilepsy have been reported under various names. Cerebellar changes may be part of the syndrome. In this study, we report the neuropathology findings in a new Dutch familial cortical myoclonic tremor with epilepsy case and review the literature on this syndrome.Methods: Neuropathological investigations were performed for a third case of the Dutch pedigree. In addition, we searched the literature for pedigrees meeting the criteria for benign familial myoclonic tremor and epilepsy.Results: Our third Dutch case showed cerebellar Purkinje cell changes and a normal cerebral cortex. The pedigrees described show phenotypical differences, cerebellar symptoms and cerebellar atrophy to a variable degree. Japanese pedigrees with linkage to chromosome 8q have been reported with milder disease features than members of Italian pedigrees with linkage to chromosome 2p. French pedigrees (5p possibly show even more severe and progressive disease, including cognitive changes and cerebellar features.Discussion: Currently, familial cortical myoclonic tremor is not listed by the International League Against Epilepsy, although it can be differentiated from other epileptic syndromes. Genetic heterogeneity and phenotypical differences between pedigrees exist. Cerebellar changes seem to be part of the syndrome in at least a number of pedigrees.

  11. Modulation of epileptiform EEG discharges in juvenile myoclonic epilepsy: An investigation of reflex epileptic traits

    DEFF Research Database (Denmark)

    Beniczky, Sándor; Guaranha, Mirian Salvadori Bittar; Conradsen, Isa

    2012-01-01

    Purpose: Previous studies have suggested that cognitive tasks modulate (provoke or inhibit) the epileptiform electroencephalography (EEG) discharges (EDs) in patients with juvenile myoclonic epilepsy (JME). Their inhibitory effect was found to be especially frequent (64–90%). These studies...... arbitrarily defined modulation as a >100% increase or >50% decrease of the EDs compared with baseline, which may not sufficiently distinguish from spontaneous fluctuations. The aim of our study was to assess the modulation of EDs and the precipitation of myoclonic seizures by cognitive tasks...... and by conventional provocation methods, taking into account also the spontaneous fluctuation of EDs. Method: Sixty patients with JME underwent video‐EEG recordings including 50‐min baseline, sleep, hyperventilation, intermittent photic stimulation (IPS), and cognitive tasks. To account for spontaneous fluctuations...

  12. Progressive myoclonic epilepsies

    Science.gov (United States)

    Michelucci, Roberto; Canafoglia, Laura; Striano, Pasquale; Gambardella, Antonio; Magaudda, Adriana; Tinuper, Paolo; La Neve, Angela; Ferlazzo, Edoardo; Gobbi, Giuseppe; Giallonardo, Anna Teresa; Capovilla, Giuseppe; Visani, Elisa; Panzica, Ferruccio; Avanzini, Giuliano; Tassinari, Carlo Alberto; Bianchi, Amedeo; Zara, Federico

    2014-01-01

    Objective: To define the clinical spectrum and etiology of progressive myoclonic epilepsies (PMEs) in Italy using a database developed by the Genetics Commission of the Italian League against Epilepsy. Methods: We collected clinical and laboratory data from patients referred to 25 Italian epilepsy centers regardless of whether a positive causative factor was identified. PMEs of undetermined origins were grouped using 2-step cluster analysis. Results: We collected clinical data from 204 patients, including 77 with a diagnosis of Unverricht-Lundborg disease and 37 with a diagnosis of Lafora body disease; 31 patients had PMEs due to rarer genetic causes, mainly neuronal ceroid lipofuscinoses. Two more patients had celiac disease. Despite extensive investigation, we found no definitive etiology for 57 patients. Cluster analysis indicated that these patients could be grouped into 2 clusters defined by age at disease onset, age at myoclonus onset, previous psychomotor delay, seizure characteristics, photosensitivity, associated signs other than those included in the cardinal definition of PME, and pathologic MRI findings. Conclusions: Information concerning the distribution of different genetic causes of PMEs may provide a framework for an updated diagnostic workup. Phenotypes of the patients with PME of undetermined cause varied widely. The presence of separate clusters suggests that novel forms of PME are yet to be clinically and genetically characterized. PMID:24384641

  13. Epilepsy with myoclonic absences - favourable response to add-on rufinamide treatment in 3 cases

    DEFF Research Database (Denmark)

    Häusler, M; Kluger, G; Nikanorova, M

    2011-01-01

    Epilepsy with myoclonic absences (EMA) is a rare epileptic syndrome with frequently poor response to antiepileptic treatment. Rufinamide (RUF) is a relatively new EMEA- and FDA-approved anticonvulsant licensed as an orphan drug for the adjunctive treatment of patients with Lennox-Gastaut syndrome....

  14. Cognitive functions in myoclonic epilepsy with ragged red fibres – a case report

    Directory of Open Access Journals (Sweden)

    Domańska Martyna

    2015-06-01

    Full Text Available Introduction. Myoclonic epilepsy with ragged red fibers (MERRF is a rare, progressive mitochondrial disease affecting multiple systems, including the central nervous system. Typical MERRF symptoms include: myoclonus, epileptic seizures, ataxia and cognitive decline. In mitochondrial diseases selective cognitive impairment or generalized decline, called mitochondrial dementia, is usually diagnosed.

  15. Nebulized corticosteroids in the management of acute exacerbation of COPD

    Directory of Open Access Journals (Sweden)

    Gaude G

    2010-01-01

    Full Text Available Acute exacerbations in chronic onstructive pulmonary disease (COPD are common and systemic steroids play an important role in the management of these cases along with the bronchodilators. Nebulized budesonide is being used in the acute attacks of bronchial asthma either in children or in adults. But the role of nebulized steroids in acute exacerbation of COPD is not much studied in the literature. In this clinical review we have evaluated the role of nebulized corticosteroids in the management of acute exacerbation of COPD (AECOPD. Through Medline, Pubmed and Embase we analyzed the various studies that has been done to study the role of nebulized corticosteroids in the management of acute exacerbation of COPD. The key words used for the search criteria were: acute exacerbation, COPD, nebulized corticosteroids, budesonide, fluticasone. Only eight studies were found which had evaluated the role of nebulized corticosteroids in acute exacerbations of COPD. All these studies had used nebulized budesonide in AECOPD in different dosages, and had been compared with both either parental or oral steroids, and standard bronchodilator therapy. All the studies had found the clinical efficacy of nebulized budesonide to be of similar extent to that of either parental or oral steroids in AECOPD. Side effects profile of nebulized budesonide was minimal and acceptable as compared to systemic steroids. Nebulized budesonide may be an alternative to parental/oral prednisolone in the treatment of acute exacerbations of COPD but further studies should be done to evaluate its long-term impact on clinical outcomes after an initial episode of COPD exacerbation.

  16. Juvenile myoclonic epilepsy as a spectrum disorder: A focused review.

    Science.gov (United States)

    Baykan, Betül; Wolf, Peter

    2017-07-01

    In consequence of newer research juvenile myoclonic epilepsy (JME) is no longer seen as a homogeneous disease. The causes of the existing variance are only partially known yet. We discuss to what extent the phenotypical spectrum of this polygenetically determined disorder expresses genetically defined endophenotypes, or is due to mere quantitative differences in the expression of the core phenotype. Of the three common seizure types of JME, myoclonic, generalized tonic-clonic and absences, absences also occur independently and are strong candidates for an endophenotype. Focal features may in some patients be seen in clinical seizures or the EEG but rarely in both. They have no morphological correlates. In a system epilepsy, local manifestations are possible, and some are due to reflex mechanisms. Of the four reflex epileptic traits common in JME, photosensitivity and praxis induction appear related to basic mechanisms of the core syndrome, whereas language-induced orofacial reflex myocloni and eye closure sensitivity are also seen in other clinical contexts and therefore seem to represent endophenotypes. Cognitive abnormalities indicating slight frontal lobe dysfunction seem to be ubiquitous in JME and are also seen in unaffected siblings of patients. Cluster B personality disorder is found in 1/3 of patients, representing a more severe expression of the underlying pathology. Treatment response and prognosis seem to be affected by an interplay of the described factors producing the severest end of the JME spectrum. The spectrum appears to be due to an interaction of stronger or weaker expression of the core phenotype with various endophenotypes. Copyright © 2017 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  17. Patient and physician evaluation of the severity of acute asthma exacerbations

    Directory of Open Access Journals (Sweden)

    Atta J.A.

    2004-01-01

    Full Text Available We studied the ability of patients not experienced in the use of peak expiratory flow meters to assess the severity of their asthma exacerbations and compared it to the assessment of experienced clinicians. We also evaluated which data of physical examination and medical history are used by physicians to subjectively evaluate the severity of asthma attacks. Fifty-seven adult patients (15 men and 42 women, with a mean (± SD age of 37.3 ± 14.5 years and 24.0 ± 17.9 years of asthma symptoms with asthma exacerbations were evaluated in a University Hospital Emergency Department. Patients and physicians independently evaluated the severity of the asthma attack using a linear scale. Patient score, physician score and forced expiratory volume at the first second (FEV1 were correlated with history and physical examination variables, and were also considered as dependent variables in multiple linear regression models. FEV1 correlated significantly with the physician score (rho = 0.42, P = 0.001, but not with patient score (rho = 0.03; P = 0.77. Use of neck accessory muscles, expiratory time and wheezing intensity were the explanatory variables in the FEV1 regression model and were also present in the physician score model. We conclude that physicians evaluate asthma exacerbation severity better than patients and that physician's scoring of asthma severity correlated significantly with objective measures of airway obstruction (FEV1. Some variables (the use of neck accessory muscles, expiratory time and wheezing intensity persisted as explanatory variables in physician score and FEV1 regression models, and should be emphasized in medical schools and emergency settings.

  18. Patient and physician evaluation of the severity of acute asthma exacerbations

    Directory of Open Access Journals (Sweden)

    J.A. Atta

    2004-09-01

    Full Text Available We studied the ability of patients not experienced in the use of peak expiratory flow meters to assess the severity of their asthma exacerbations and compared it to the assessment of experienced clinicians. We also evaluated which data of physical examination and medical history are used by physicians to subjectively evaluate the severity of asthma attacks. Fifty-seven adult patients (15 men and 42 women, with a mean (± SD age of 37.3 ± 14.5 years and 24.0 ± 17.9 years of asthma symptoms with asthma exacerbations were evaluated in a University Hospital Emergency Department. Patients and physicians independently evaluated the severity of the asthma attack using a linear scale. Patient score, physician score and forced expiratory volume at the first second (FEV1 were correlated with history and physical examination variables, and were also considered as dependent variables in multiple linear regression models. FEV1 correlated significantly with the physician score (rho = 0.42, P = 0.001, but not with patient score (rho = 0.03; P = 0.77. Use of neck accessory muscles, expiratory time and wheezing intensity were the explanatory variables in the FEV1 regression model and were also present in the physician score model. We conclude that physicians evaluate asthma exacerbation severity better than patients and that physician's scoring of asthma severity correlated significantly with objective measures of airway obstruction (FEV1. Some variables (the use of neck accessory muscles, expiratory time and wheezing intensity persisted as explanatory variables in physician score and FEV1 regression models, and should be emphasized in medical schools and emergency settings.

  19. Familial Cortical Myoclonic Tremor and Epilepsy, an Enigmatic Disorder: From Phenotypes to Pathophysiology and Genetics. A Systematic Review

    NARCIS (Netherlands)

    van den Ende, Tom; Sharifi, Sarvi; van der Salm, Sandra M. A.; van Rootselaar, Anne-Fleur

    2018-01-01

    Autosomal dominant familial cortical myoclonic tremor and epilepsy (FCMTE) is characterized by distal tremulous myoclonus, generalized seizures, and signs of cortical reflex myoclonus. FCMTE has been described in over 100 pedigrees worldwide, under several different names and acronyms. Pathological

  20. Characterisation of exacerbation risk and exacerbator phenotypes in the POET-COPD trial.

    Science.gov (United States)

    Beeh, Kai M; Glaab, Thomas; Stowasser, Susanne; Schmidt, Hendrik; Fabbri, Leonardo M; Rabe, Klaus F; Vogelmeier, Claus F

    2013-10-29

    Data examining the characteristics of patients with frequent exacerbations of chronic obstructive pulmonary disease (COPD) and associated hospitalisations and mortality are scarce. Post-hoc analysis of the Prevention Of Exacerbations with Tiotropium in COPD (POET-COPD) trial, targeting exacerbations as the primary endpoint. Patients were classified as non-, infrequent, and frequent exacerbators (0, 1, or ≥ 2 exacerbations during study treatment), irrespective of study treatment. A multivariate Cox regression model assessed the effect of covariates on time to first exacerbation. In total, 7376 patients were included in the analysis: 63.5% non-exacerbators, 22.9% infrequent, 13.6% frequent exacerbators. Factors significantly associated with exacerbation risk were age, sex, body mass index, COPD duration and severity, smoking history, baseline inhaled corticosteroid use, and preceding antibiotic or systemic corticosteroid courses. Frequent exacerbators had greater severity and duration of COPD, received more pulmonary medication, and ≥ 2 systemic corticosteroid or antibiotic courses in the preceding year, and were more likely to be female and ex-smokers. The small proportion of frequent exacerbators (13.6%) accounted for 56.6% of exacerbation-related hospitalisations, which, overall, were associated with a three-fold increase in mortality. The frequent exacerbator phenotype was closely associated with exacerbation-related hospitalisations, and exacerbation-related hospitalisations were associated with poorer survival. NCT00563381; Study identifier: BI 205.389.

  1. Role of bacterial infection in the exacerbation of acute or prolonged asthma attack in children

    Directory of Open Access Journals (Sweden)

    Yoko Nagayama

    1999-01-01

    Full Text Available Quantitatively cultured bacteria in sputum sampled from asthmatic children aged 0–14 years was examined to determine whether there is a relationship between asthmatic states and bacterial species present in the respiratory tract. We used cytological examination to improve the specificity of pathogens cultured in sputum. Asthmatic children were divided into three groups: (i group 1, acute asthma attack (n=191; (ii group 2, prolonged asthma attack (n=68; and (iii group 3, pneumonia without asthma attack (n=39. The number of specimens was 212, 75 and 44 for groups 1, 2 and 3, respectively. The number of specimens with pathogenic bacteria present in group 1 decreased with age, from 36.8% in infants under 1 year of age to 8.7% in children over the age of 9 years. The species of bacteria in group 1 were Haemophilus influenzae, Streptococcus pneumoniae, Moraxella catarrhalis and these were distributed evenly in the samples. In group 2, pathogenic bacteria were present in 34.7% of patients (26/75, peaking at over 40% among children between 4 and 8 years of age. The presence of H. influenzae was dominant in group 2. The percentage of pathogenic bacteria present in group 3 specimens was 40.9%. The data suggest that there is a significant relationship between the presence of bacteria in sputum and clinical symptoms, such as fever and pneumonic episodes, during acute asthma attacks.

  2. Myoclonic epilepsy of late onset in trisomy 21 Epilepsia mioclônica de início tardio na trissomia 21

    Directory of Open Access Journals (Sweden)

    Lm. Li

    1995-12-01

    Full Text Available We report the case of a patient with trisomy 21 (T21 with late onset epilepsy. The electro-clinical features were of myoclonic jerks on awakening and generalised tonic clonic seizures, with generalised spike and wave on EEG, and a progressive dementia. As familial Alzheimer's dementia and progressive myoclonic epilepsy (Unverricht-Lundborg type are both linked to the chromosome 21, this case may represent a distinct progressive myoclonic epilepsy related to T21.Pacientes com trissomia do cromossoma 21 (T21, com o passar dos anos, são propensos a desenvolver crises epilépticas parciais concomitantes ao aparecimento de degeneração cerebral do tipo Alzheimer. Pacientes com T21 e demência parecem ter risco maior de apresentarem crises epilépticas que outros pacientes com degeneração cerebral do tipo Alzheimer. O caso relatado é de um paciente com T21 com epilepsia de início tardio. A história clínica consiste de crises mioclônicas ao despertar, ocasionais crises generalizadas tônico-clônicas, demência e ponta onda generalisada no EEG. Demência do tipo Alzheimer familial é ligada ao cromossoma 21, bem como epilepsia mioclônica progressiva (tipo Unverricht-Lundborg. Isto sugere que este caso possa representar um tipo distinto de epilepsia mioclônica progressiva, ligado ao cromossoma 21.

  3. Exacerbations of COPD: quantifying the patient's perspective using discrete choice modelling.

    Science.gov (United States)

    Haughney, J; Partridge, M R; Vogelmeier, C; Larsson, T; Kessler, R; Ståhl, E; Brice, R; Löfdahl, C-G

    2005-10-01

    Patient-centred care is the current vogue in chronic obstructive pulmonary disease (COPD), but it is only recently that robust techniques have become available to determine patients' values and preferences. In this international cross-sectional study, patients' concerns and expectations regarding COPD exacerbations were explored using discrete choice modelling. A fractional factorial design was used to develop scenarios comprising a combination of levels for nine different attributes. In face-to-face interviews, patients were presented with paired scenarios and asked to choose the least preferable. Multinomial logit (with hierarchical Bayes) methods were used to estimate utilities. A total of 125 patients (82 males; mean age 66 yrs; 4.6 mean exacerbations.yr-1) were recruited. The attributes of exacerbations considered most important were impact on everyday life (20%), need for medical care (16%), number of future attacks (12%) and breathlessness (11%). The next most important attributes were speed of recovery, productive cough and social impact (all 9%), followed by sleep disturbance and impact on mood (both 7%). Importantly, analysis of utility shifts showed that patients most feared being hospitalised, housebound or bedridden. These issues were more important than symptom improvement. Strategies for the clinical management of chronic obstructive pulmonary disease should clearly address patients' concerns and focus on preventing and treating exacerbations to avoid these feared outcomes.

  4. A Native Haitian Woman with Unverricht-Lundborg Disease

    Directory of Open Access Journals (Sweden)

    Maliheh Mohamadpour

    2017-12-01

    Full Text Available Unverricht-Lundborg disease (ULD is an autosomal recessive progressive myoclonic epilepsy. The prevalence is highest in specific European countries and North Africa. Affected individuals have myoclonic and tonic-clonic seizures and a variable degree of ataxia and cognitive impairment. We report a native Haitian woman with ULD who was wheelchair bound due to nearly continuous myoclonic seizures exacerbated by activity and emotional distress. The seizures and their dramatic increase with volitional activity were recorded during video electroencephalography monitoring. Rational antiepileptic drug therapy controlled the seizures well enough for the patient to achieve a level of independence she had not experienced in over 25 years.

  5. Addition of verapamil in the treatment of severe myoclonic epilepsy in infancy.

    Science.gov (United States)

    Iannetti, Paola; Parisi, Pasquale; Spalice, Alberto; Ruggieri, Martino; Zara, Federico

    2009-07-01

    We report on the use of the voltage-gated calcium channel blocker (Vg-CCB), verapamil, as an add-on anticonvulsant medication in two girls, 4 and 14 years of age, who were affected by severe myoclonic epilepsy in infancy (SMEI) or Dravet syndrome, a channelopathy caused by abnormalities in the voltage-gated sodium channel neuronal type alpha1 subunit (SCN1A) gene at 2q24. Both girls had pharmacoresistant epilepsy and developmental delay. Mutation analysis for the SCN1A gene revealed a missense mutation in exon 2 in the 4-year-old girl. Verapamil was co-administered in both children with a prompt response in controlling status epilepticus, myoclonic jerks, and partial and generalized seizures. The therapeutic effect lasted 13 months in the 14-year-old girl, while it is still present after a 20-month follow-up period in the 4-year-old girl who, in addition, has experienced improvement in motor and language development. The verapamil vVg-CCB, which crosses the blood-brain barrier (BBB): (a) inhibits the P-glycoprotein, an active efflux transporter protein expressed in normal tissue, including the brain, which is believed to contribute to the in situ phenomenon of multidrug resistance; and (b) may regulate membrane depolarization induced by abnormal sodium channels functions by modulating the abnormal Ca++ influxes into neurons with subsequent cell resting. This is the first report on long-lasting verapamil therapy in SMEI. The functional consequences of such in vivo modulating effects on Ca++ channels could contribute to rational targeting for future molecular therapeutic approaches in pharmacoresistant epileptic channelopathies.

  6. Reduced ceramide synthase 2 activity causes progressive myoclonic epilepsy

    DEFF Research Database (Denmark)

    Mosbech, Mai-Britt; Olsen, Anne S B; Neess, Ditte

    2014-01-01

    between genes involved in SL metabolism and epilepsy. METHODS: We used quantitative real-time PCR, Western blotting, and enzymatic assays to determine the mRNA, protein, and activity levels of ceramide synthase 2 (CERS2) in fiibroblasts isolated from parental control subjects and from a patient diagnosed...... with progressive myoclonic epilepsy (PME). Mass spectrometry and fluorescence microscopy were used to examine the effects of reduced CERS2 activity on cellular lipid composition and plasma membrane functions. RESULTS: We identify a novel 27 kb heterozygous deletion including the CERS2 gene in a proband diagnosed...... with PME. Compared to parental controls, levels of CERS2 mRNA, protein, and activity were reduced by ˜50% in fibroblasts isolated from this proband, resulting in significantly reduced levels of ceramides and sphingomyelins containing the very long-chain fatty acids C24:0 and C26:0. The change in SL...

  7. Antioxidant status in acute asthmatic attack in children

    International Nuclear Information System (INIS)

    Al-Abdulla, N.O.; Al-Naama, L.M.; Hassan, M.K.

    2010-01-01

    Objectives: To determine the oxidant - antioxidant imbalance in asthmatic children, by measuring the levels of malondialdehyde (MDA) as an oxidant marker of lipid peroxidation as well as antioxidant compounds like vitamin C, vitamin E and uric acid and to investigate whether their concentrations are associated with more severe asthma. Methods: This case controlled prospective study was conducted on 219 children aged 1-12 years, attending Basra Maternity and Children Hospital. Included were 98 asthmatic children during acute attack and 121 non asthmatic, apparently healthy children. Serum malondialdehyde (MDA) as an oxidant marker of lipid peroxidation, and vitamin C, vitamin E and uric acid (as antioxidants) were estimated in asthmatic children during acute attack and compared with non-asthmatic children. Results: Asthmatic children during exacerbation of their asthma have significant lower serum levels of antioxidant compounds like vitamin C, vitamin E and uric acid (p<0.001) and significantly high malondialdehyde as compared with the controls. MDA was significantly elevated (P< 0.001), while that of vitamin C, vitamin E and uric acid were significantly decreased with increasing severity of asthmatic attack (P<0.001). A significant negative correlation between MDA with vitamin C (P<0.05, r = - 0.44) was observed in severe asthmatic attacks. Conclusion: Asthmatic patients during acute attack suffer a high degree of reactive oxygen species formation causing considerable oxidative stress that is indicated by the high level of oxidants (MDA) and low level of antioxidants. (author)

  8. Brain imaging with 123I-IMP-SPECT in migraine between attacks

    International Nuclear Information System (INIS)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.; Husstedt, I.W.

    1989-01-01

    123 I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migraine attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors

  9. Exacerbation of Behçet's syndrome and familial Mediterranean fever with menstruation.

    Science.gov (United States)

    Guzelant, Gul; Ozguler, Yesim; Esatoglu, Sinem Nihal; Karatemiz, Guzin; Ozdogan, Huri; Yurdakul, Sebahattin; Yazici, Hasan; Seyahi, Emire

    2017-01-01

    Menstruation triggers several conditions such as migraine, recurrent aphthous stomatitis and acne vulgaris in healthy individuals. There is evidence that Behçet's syndrome (BS) and familial Mediterranean fever (FMF) may exacerbate during menstruation. The aim is to assess whether BS and FMF patients experience menstrual flares. Females of reproductive age with BS and FMF seen consecutively at the outpatient clinic of Cerrahpasa Medical Faculty at Istanbul, as well as apparently healthy hospital workers were studied using a standardised questionnaire. BS patients were asked whether they experienced increased skin-mucosa lesions during the menstrual period. A similar questionnaire assessing this time the frequency of abdominal pain, chest pain and fever attacks was given to the patients with FMF. The healthy controls received both questionnaires. A total of 200 BS patients, 240 FMF patients and 250 healthy controls were studied. The most commonly reported symptom among both BS patients (51%) and healthy controls (62%) was the acneiform lesion. At least 79% patients with FMF reported attacks with menstruation, notably abdominal pain which, majority thought, could be differentiated from dysmenorrhea. Additionally, 76% of healthy controls reported having abdominal pain consistent most probably with dysmenorrhea. This survey showed that, in 68% of the patients with BS at least one skin mucosa lesion was exacerbated with menstruation, this was most commonly acneiform lesion. Menstruation had a slightly stronger effect on FMF, triggering at least one symptom in 79%. The main limitation of the study was the self-reported assessment methodology.

  10. Occipital epilepsy versus progressive myoclonic epilepsy in a patient with continuous occipital spikes and photosensitivity in electroencephalogram: A case report.

    Science.gov (United States)

    Lv, Yudan; Zhang, Nan; Liu, Chang; Shi, Mingchao; Sun, Li

    2018-04-01

    Progressive myoclonic epilepsy (PME) is rare epilepsy syndrome. Although EEG is a useful neurophysiological technique in the evaluation of epilepsy, few EEG abnormalities have been described in PME. So, how to use EEG hints to establish the suspected diagnosis of PME as soon as possible should be addressed. We presented a case with refractory myoclonic seizures, and progressive neurological deterioration, diagnosed as PME and neuronal ceroid lipofuscinosis disease by gene testing. The patient manifested with a significant regression in her speech ability and motor balance. The mini-mental state examination showed poor scores of 15/30. The magnetic resonance imaging showed diffused atrophy. Her EEG showed slow background with continuous occipital small spikes and photosensitivity. The following genetic testing with mutation in CLN6 confirmed the diagnosis and excluded the occipital epilepsy. Our case showed rare manifestations and special EEG features of PME, which may be confused with occipital epilepsy or photosensitive epilepsy. Thus, if the continuous occipital spikes and photosensitivity were presented in a patient with refractory seizures and developmental regression, PME should be considered.

  11. Exacerbations of asthma - A descriptive study of 425 severe exacerbations

    NARCIS (Netherlands)

    Tattersfield, AE; Postma, DS; Barnes, PJ; Svensson, K; Bauer, CA; O'Byrne, PM; Lofdahl, CG; Pauwels, RA; Ullman, A

    The identification, prevention, and prompt treatment of exacerbations are major objectives of asthma management. We looked at change in PEF, symptoms, and use of rescue p-agonists during the 425 severe exacerbations that occurred during a 12-mo parallel group study (FACET) in which low and high

  12. Opercular myoclonic-anarthric status epilepticus: A report of two cases

    Directory of Open Access Journals (Sweden)

    Janapareddy Vijaya Bhaskara Rao

    2013-01-01

    Full Text Available Opercular myoclonic-anarthric status epilepticus (OMASE is an uncommon disorder of diverse etiology. This condition is characterized by fluctuating cortical dysarthria associated with epileptic myoclonus involving glossopharyngeal musculature bilaterally. We report two cases of OMASE of vascular etiology in adults. In both patients, ictally clonic expression was consistent with epilepsia partialis continua and bilateral, symmetrical involvement of soft palate in one patient and tongue, lips, chin and inferior jaw in both patients due to bilateral projections of the inferior corticonuclear pathways. The inferior rolandic area of dominant and high frontal region in non-dominant hemispheres were involved by an epileptogenic lesion of vascular etiology, which was confirmed by magnetic resonance imaging of brain and single photon emission computerized tomography. Carotid Doppler study showed thrombosis of internal carotid artery in both patients, suggestive of an embolic origin. Early recognition of OMASE is important for early management of carotid occlusive disease.

  13. Impact of exacerbations on COPD

    Directory of Open Access Journals (Sweden)

    A. Anzueto

    2010-06-01

    Full Text Available Exacerbations of chronic obstructive pulmonary disease (COPD determine disease-associated morbidity, mortality, resource burden and healthcare costs. Acute exacerbation care requirements range from unscheduled primary care visits to emergency room, inpatient or intensive care, generating significant costs in COPD. Even after an exacerbation resolves, respiratory, physical, social and emotional impairment may persist for prolonged time. Frequent exacerbations, mainly in patients with severe COPD, accelerate disease progression and mortality. Thus, patients with frequent exacerbations have a more rapid decline in lung function, worse quality of life and decreased exercise performance. Management of COPD directed to reduce incidence and severity of exacerbations improves long-term health status and conserves health care resources and costs.

  14. Acute exacerbation of COPD.

    Science.gov (United States)

    Ko, Fanny W; Chan, Ka Pang; Hui, David S; Goddard, John R; Shaw, Janet G; Reid, David W; Yang, Ian A

    2016-10-01

    The literature of acute exacerbation of chronic obstructive pulmonary disease (COPD) is fast expanding. This review focuses on several aspects of acute exacerbation of COPD (AECOPD) including epidemiology, diagnosis and management. COPD poses a major health and economic burden in the Asia-Pacific region, as it does worldwide. Triggering factors of AECOPD include infectious (bacteria and viruses) and environmental (air pollution and meteorological effect) factors. Disruption in the dynamic balance between the 'pathogens' (viral and bacterial) and the normal bacterial communities that constitute the lung microbiome likely contributes to the risk of exacerbations. The diagnostic approach to AECOPD varies based on the clinical setting and severity of the exacerbation. After history and examination, a number of investigations may be useful, including oximetry, sputum culture, chest X-ray and blood tests for inflammatory markers. Arterial blood gases should be considered in severe exacerbations, to characterize respiratory failure. Depending on the severity, the acute management of AECOPD involves use of bronchodilators, steroids, antibiotics, oxygen and noninvasive ventilation. Hospitalization may be required, for severe exacerbations. Nonpharmacological interventions including disease-specific self-management, pulmonary rehabilitation, early medical follow-up, home visits by respiratory health workers, integrated programmes and telehealth-assisted hospital at home have been studied during hospitalization and shortly after discharge in patients who have had a recent AECOPD. Pharmacological approaches to reducing risk of future exacerbations include long-acting bronchodilators, inhaled steroids, mucolytics, vaccinations and long-term macrolides. Further studies are needed to assess the cost-effectiveness of these interventions in preventing COPD exacerbations. © 2016 Asian Pacific Society of Respirology.

  15. Progressive myoclonic epilepsies: definitive and still undetermined causes.

    Science.gov (United States)

    Franceschetti, Silvana; Michelucci, Roberto; Canafoglia, Laura; Striano, Pasquale; Gambardella, Antonio; Magaudda, Adriana; Tinuper, Paolo; La Neve, Angela; Ferlazzo, Edoardo; Gobbi, Giuseppe; Giallonardo, Anna Teresa; Capovilla, Giuseppe; Visani, Elisa; Panzica, Ferruccio; Avanzini, Giuliano; Tassinari, Carlo Alberto; Bianchi, Amedeo; Zara, Federico

    2014-02-04

    To define the clinical spectrum and etiology of progressive myoclonic epilepsies (PMEs) in Italy using a database developed by the Genetics Commission of the Italian League against Epilepsy. We collected clinical and laboratory data from patients referred to 25 Italian epilepsy centers regardless of whether a positive causative factor was identified. PMEs of undetermined origins were grouped using 2-step cluster analysis. We collected clinical data from 204 patients, including 77 with a diagnosis of Unverricht-Lundborg disease and 37 with a diagnosis of Lafora body disease; 31 patients had PMEs due to rarer genetic causes, mainly neuronal ceroid lipofuscinoses. Two more patients had celiac disease. Despite extensive investigation, we found no definitive etiology for 57 patients. Cluster analysis indicated that these patients could be grouped into 2 clusters defined by age at disease onset, age at myoclonus onset, previous psychomotor delay, seizure characteristics, photosensitivity, associated signs other than those included in the cardinal definition of PME, and pathologic MRI findings. Information concerning the distribution of different genetic causes of PMEs may provide a framework for an updated diagnostic workup. Phenotypes of the patients with PME of undetermined cause varied widely. The presence of separate clusters suggests that novel forms of PME are yet to be clinically and genetically characterized.

  16. Usefulness of modified Pulmonary Index Score (mPIS) as a quantitative tool for the evaluation of severe acute exacerbation in asthmatic children.

    Science.gov (United States)

    Koga, Takeshi; Tokuyama, Kenichi; Itano, Atsushi; Morita, Eiji; Ueda, Yutaka; Katsunuma, Toshio

    2015-04-01

    Acute exacerbation of asthma is divided qualitatively into mild, moderate, and severe attacks and respiratory failure. This system is, however, not suitable for estimating small changes in respiratory condition with time and for determining the efficacy of treatments, because it has a qualitative, but not quantitative nature. To evaluate the usefulness of quantitative estimation of asthma exacerbation, modified Pulmonary Index Score (mPIS) values were measured in 87 asthmatic children (mean age, 5.0 ± 0.4 years) during hospitalization. mPIS was calculated by adding the sum of scores for 6 items (scores of 0-3 were given for each item). These consisted of heart rate, respiratory rate, accessory muscle use, inspiratory-to-expiratory flow ratio, degree of wheezing, and oxygen saturation in room air. Measurements were made at visits and at hospitalization and were then made twice a day until discharge. mPIS values were highly correlated among raters. mPIS values at visits were 9.1 ± 0.1 and 12.6 ± 0.4 in subjects with moderate and severe attacks, respectively (p asthma attacks, including the determination of a treatment plan, and prediction of the period of hospitalization in admitted patients, although prospective studies would be required to establish our hypothesis. Copyright © 2014 Japanese Society of Allergology. Production and hosting by Elsevier B.V. All rights reserved.

  17. Exacerbations of asthma during pregnancy

    DEFF Research Database (Denmark)

    Ali, Z; Hansen, A V; Ulrik, C S

    2016-01-01

    Asthma is common among pregnant women, and the incidence of asthma exacerbations during pregnancy is high. This literature review provides an overview of the impact of exacerbations of asthma during pregnancy on pregnancy-related complications. The majority of published retrospective studies reveal...... that asthma exacerbations during pregnancy increase the risk of pre-eclampsia, gestational diabetes, placental abruption and placenta praevia. Furthermore, these women also have higher risk for breech presentation, haemorrhage, pulmonary embolism, caesarean delivery, maternal admission to the intensive care...... to these outcomes. In conclusion, asthma exacerbations during pregnancy are associated with complications of pregnancy, labour and delivery. Prevention of exacerbations is essential to reduce the risk of complications and poor outcome....

  18. Altered glucose metabolism in juvenile myoclonic epilepsy: a PET study with statistical parametric mapping

    International Nuclear Information System (INIS)

    Lim, G. C.; Kim, J. H.; Kang, J. G.; Kim, J. S.; Yeo, J. S.; Lee, S. A.; Moon, D. H

    2004-01-01

    Juvenile myoclonic epilepsy (JME) is a hereditary, age-dependent epilepsy syndrome, characterized by myoclonic jerks on awakening and generalized tonic-clonic seizures. Although there have been considerable studies on the mechanism to elucidate pathogenesis of JME, the accurate pathogenesis of JME remains obscure. The aim of this study was to investigate alterations of cerebral glucose metabolism in patients with JME. We studied 16 JME patients (Mean age: 22 yrs, M/F: 9/7) with brain FDG-PET and simultaneous EEG recording. On the basis of the number of generalized spike-and-wave (GSW) discharges on the 30 min EEG recording after the injection of FDG (370MBq), we classified patients into two groups (patients in group A had 10 or more GSW and group B. 9 or less). We applied the automated and objective technique of statistical parametric mapping (SPM) to the analysis of FDG-PET to determine the significant hyper- and hypometabolic regions compared with those of 19 age matched normal control subjects. We found significant hypermetabolic regions in bilateral thalamus and central portion of upper brainstem in 16 patients with JME at a statistical threshold of uncorrected P < 0.05. These changes were also shown in group A (n=8), but not in group B (n=8). Additionally, we found significant hypometabolism in bilateral, widespread cortical regions in 16 patients with JME at a threshold of uncorrected P < 0.01. Similar hypometabolic patterns were also observed in both group A and group B, being more prominent in group A. This study provides evidence for the key role of the thalamus and brainstem reticular activating system in generating spontaneous GSW discharge, which is considered as a fundamental pathogenesis underlying JME. This study also suggests that patients with JME might suffer from subtle abnormalities of cognitive and executive cortical functions

  19. Altered glucose metabolism in juvenile myoclonic epilepsy: a PET study with statistical parametric mapping

    Energy Technology Data Exchange (ETDEWEB)

    Lim, G. C.; Kim, J. H.; Kang, J. G.; Kim, J. S.; Yeo, J. S.; Lee, S. A.; Moon, D. H [Asan Medical Center, Seoul (Korea, Republic of)

    2004-07-01

    Juvenile myoclonic epilepsy (JME) is a hereditary, age-dependent epilepsy syndrome, characterized by myoclonic jerks on awakening and generalized tonic-clonic seizures. Although there have been considerable studies on the mechanism to elucidate pathogenesis of JME, the accurate pathogenesis of JME remains obscure. The aim of this study was to investigate alterations of cerebral glucose metabolism in patients with JME. We studied 16 JME patients (Mean age: 22 yrs, M/F: 9/7) with brain FDG-PET and simultaneous EEG recording. On the basis of the number of generalized spike-and-wave (GSW) discharges on the 30 min EEG recording after the injection of FDG (370MBq), we classified patients into two groups (patients in group A had 10 or more GSW and group B. 9 or less). We applied the automated and objective technique of statistical parametric mapping (SPM) to the analysis of FDG-PET to determine the significant hyper- and hypometabolic regions compared with those of 19 age matched normal control subjects. We found significant hypermetabolic regions in bilateral thalamus and central portion of upper brainstem in 16 patients with JME at a statistical threshold of uncorrected P < 0.05. These changes were also shown in group A (n=8), but not in group B (n=8). Additionally, we found significant hypometabolism in bilateral, widespread cortical regions in 16 patients with JME at a threshold of uncorrected P < 0.01. Similar hypometabolic patterns were also observed in both group A and group B, being more prominent in group A. This study provides evidence for the key role of the thalamus and brainstem reticular activating system in generating spontaneous GSW discharge, which is considered as a fundamental pathogenesis underlying JME. This study also suggests that patients with JME might suffer from subtle abnormalities of cognitive and executive cortical functions.

  20. Risky Decision Making in Juvenile Myoclonic Epilepsy

    Directory of Open Access Journals (Sweden)

    Iris Unterberger

    2018-03-01

    Full Text Available It is not known whether patients with juvenile myoclonic epilepsy (JME differ from healthy people in decision making under risk, i.e., when the decision-making context offers explicit information about options, probabilities, and consequences already from the beginning. In this study, we adopted the Game of Dice Task-Double to investigate decision making under risk in a group of 36 patients with JME (mean age 25.25/SD 5.29 years and a group of 38 healthy controls (mean age 26.03/SD 4.84 years. Participants also underwent a comprehensive neuropsychological assessment focused on frontal executive functions. Significant group differences were found in tests of psychomotor speed and divided attention, with the patients scoring lower than the controls. Importantly, patients made risky decisions more frequently than controls. In the patient group, poor decision making was associated with poor executive control, poor response inhibition, and a short interval since the last seizure episode. Executive control and response inhibition could predict 42% of variance in the frequency of risky decisions. This study indicates that patients with JME with poorer executive functions are more likely to make risky decisions than healthy controls. Decision making under risk is of major importance in every-day life, especially with regard to treatment decisions and adherence to long-term medical therapy. Since even a single disadvantageous decision may have long-lasting consequences, this finding is of high relevance.

  1. Risky Decision Making in Juvenile Myoclonic Epilepsy.

    Science.gov (United States)

    Unterberger, Iris; Zamarian, Laura; Prieschl, Manuela; Bergmann, Melanie; Walser, Gerald; Luef, Gerhard; Javor, Andrija; Ransmayr, Gerhard; Delazer, Margarete

    2018-01-01

    It is not known whether patients with juvenile myoclonic epilepsy (JME) differ from healthy people in decision making under risk, i.e., when the decision-making context offers explicit information about options, probabilities, and consequences already from the beginning. In this study, we adopted the Game of Dice Task-Double to investigate decision making under risk in a group of 36 patients with JME (mean age 25.25/SD 5.29 years) and a group of 38 healthy controls (mean age 26.03/SD 4.84 years). Participants also underwent a comprehensive neuropsychological assessment focused on frontal executive functions. Significant group differences were found in tests of psychomotor speed and divided attention, with the patients scoring lower than the controls. Importantly, patients made risky decisions more frequently than controls. In the patient group, poor decision making was associated with poor executive control, poor response inhibition, and a short interval since the last seizure episode. Executive control and response inhibition could predict 42% of variance in the frequency of risky decisions. This study indicates that patients with JME with poorer executive functions are more likely to make risky decisions than healthy controls. Decision making under risk is of major importance in every-day life, especially with regard to treatment decisions and adherence to long-term medical therapy. Since even a single disadvantageous decision may have long-lasting consequences, this finding is of high relevance.

  2. Increased Incidence Rate of Trauma- and Stressor-related Disorders in Denmark After the Breivik Attacks in Norway.

    Science.gov (United States)

    Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D

    2017-11-01

    On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.

  3. CLINICAL AND ELECTROENCEPHALOGRAPHIC CHANGES IN JUVENILE MYOCLONIC EPILEPSY (A LECTURE

    Directory of Open Access Journals (Sweden)

    K. Yu. Mukhin

    2014-01-01

    Full Text Available Juvenile myoclonic epilepsy (JME is a form of idiopathic generalized epilepsy characterized by adolescent onset with massive myoclonicseizures and, in most cases, convulsive seizures occurring mainly on awakening. According to the Proposed Diagnostic Schema for Peoplewith Epileptic Seizures and with Epilepsy (2001, JME is classified into a group of idiopathic generalized epilepsy with a variable phenotype. The authors give the genetic bases of the disease, describe its clinical picture in detail, including the atypical course of JME, and consider diagnostic criteria, approaches to patient management, and principles of medical therapy. By taking into account the most common precipitating factors, along with drug therapy, the sleep and wake regimen must be strictly adhered to and household photo stimulation be avoided. Complete medical remission is achieved in about 90 % of patients (on correctly chosen therapy, in most cases on monotherapy. However, the problem resides in high recurrence rates after withdrawal of antiepileptic drugs. The major predictors of increased risk for a recurrence aftertherapy discontinuation are considered.

  4. Graduated clinical manifestations according to mutation type in patients with severe myoclonic epilepsy in infancy

    DEFF Research Database (Denmark)

    Brusgaard, Klaus; Møller, Rikke Steensbjerre; Dahl, Hans Atli

    . Later, patients also manifest other seizure types, including absence, myoclonic, and simple and complex partial seizures. Psychomotor development stagnates around the second year of life. SME is considered to be the most severe phenotype within the spectrum of GEFS+. SME is a malignant epileptic...... and intractable childhood epilepsy with generalized tonic-clonic seizures (ICE-GTC) at the severe end Patients and methods 87 infants representing GEFS+ were analyzed by bidirectional sequencing of all exons of the SCN1A, SCN2A, GABRG2 or SCN1B genes. Additionally, MLPA analysis of SCN1A was performed. Results...... to the SMEI phenotype represent de novo incidences....

  5. Prevention of COPD exacerbations

    DEFF Research Database (Denmark)

    Vestbo, Jørgen; Lange, Peter

    2015-01-01

    Exacerbations have significant impact on the morbidity and mortality of patients with chronic obstructive pulmonary disease. Most guidelines emphasise prevention of exacerbations by treatment with long-acting bronchodilators and/or anti-inflammatory drugs. Whereas most of this treatment is eviden...

  6. IMPACT OF THE THERAPY WITH TUMOR NECROSIS FACTOR α INHIBITORS ON THE FREQUENCY OF UVEITIS EXACERBATIONS IN PATIENTS WITH ANKYLOSING SPONDYLITIS

    Directory of Open Access Journals (Sweden)

    Alla A Godzenko

    2014-01-01

    Full Text Available The course of uveitis in patients with ankylosing spondylitis (AS does not always correlate with inflammation in the axial skeleton and peripheral joints. Effect of tumor necrosis factor α (TNFα inhibitors on uveitis has been insufficiently studied yet, unlike their effect on the peripheral joints and spine.Objective. To compare the frequency of uveitis attacks in patients with AS during treatment with TNFα inhibitors and the conventional anti-inflammatory therapy.Materials and Methods. The study included 48 patients with AS and recurrent uveitis treated with TNFα inhibitors: 25 – infliximab, 15 – adalimumab, 9 – etanercept; 7 patients received two or more drugs sequentially. Median [25th, 75th percentiles] of the treatment duration was 3 [3.5; 5] years. The duration of treatment since the first attack of uveitis until administration of TNFα inhibitors was 5 [5; 9.7] years. Eighteen patients received only nonsteroidal anti-inflammatory drugs (NSAIDs, 30 patients received NSAIDs and basic anti-inflammatory drugs (DMARDs, including sulfasalazine (n = 23, methotrexate (n = 4, and cyclosporine (n = 4.Results. The median number of uveitis exacerbations during the standard anti-inflammatory therapy was 1 [0.4; 3] per year; during treatment with TNFα inhibitors – 0 [0; 0.5] per year (p = 0.0007. In 19 of 48 patients (40%, no exacerbations of uveitis were registered during therapy with these drugs. The frequency of uveitis attacks in patients treated with infliximab decreased from 1 [0.2; 2.75] to 0.1 [0; 0.8] episodes per year (p = 0.002, adalimumab – from 1.75 [1; 4.5] to 0 [0; 0.07] (p = 0.04, etanercept – from 0.95 [0.5; 1.75] to 0 [0; 0.07] (p = 0.001.Conclusion. Administration of TNFα inhibitors significantly reduces the frequency of uveitis attacks in patients with AS.

  7. Analysis of hormone-dependent pathology in female patients with juvenile myoclonic epilepsy

    Directory of Open Access Journals (Sweden)

    D. V. Anisimova

    2017-01-01

    Full Text Available Objective: to study the characteristics of manifestations of hormonal abnormalities in women with juvenile myoclonic epilepsy (JME and to comparatively analyze identified syndromes.Patients and methods. Hormonal disorders were analyzed in 48 reproductive-aged women with JME, who had received antiepileptic drug (AED mono- and bitherapy during one or more years.Results. 66.7% of the patients were found to have ovarian hormonal dysfunction manifesting itself as the development of polycystic ovary syndrome, hypogonadism, isolated hyperandrogenism, and hypoprogesteronemia. Clinically detected syndromes frequently appeared as menstrual irregularity in 29% of the patients. Comparative analysis of hormone-dependent syndromes showed that there were no differences in the clinical features of JME, but the earliest age at onset in isolated hyperandrogenism, and no patients with menstrual irregularity in the presence of isolated hypoprogesteronemia. The use of different AEDs had no impact on the incidence of hormonal abnormalities, which requires further investigation and its inclusion of a greater number of patients receiving various AEDs. 

  8. Juvenile Myoclonic Epilepsy In India : Some Interesting Observations

    Directory of Open Access Journals (Sweden)

    Jha Sanjeev

    2004-01-01

    Full Text Available Material and Method: Study was conducted in 132 cases of JME. They were selected after screening 1210 patients presenting with syndrome of generalized seizures in age group 10-36 years. Diagnosis was established clinically by standard criterias and confirmed by EEG. Duration of study was 9 years. Results : We observed JME is under diagnosed since majority (27% were referred as uncontrolled seizures. Other patients were referred as Lenox Gestaut syndrome (19%, progressive myoclonic epilepsy (7.5% or subacute sclerosing pan-encephalitis (3.7%. There were 25 (15.5% fresh cases of JME who reported directly. We observed few atypical features in our study. They were in the form of (a wide range in age of onset (b gross delay in diagnosis (90%-lack of clinical suspicion and non-use of activation procedures in EEG appear to be important reasons for this delay (c negative family history (90% (d mild cognitive impairment (14% and (e good clinical response to other drugs viz; clobazam, phenytoin (PHT and carbamazepine (CBZ besides sodium valproate (VPA or clonazepam (CLO. However phenobarbitone (PB was ineffective. Sequential EEG became normal in 63% patients controlled on VPA while it was persistently abnormal in all patients who were well controlled on other drugs. Conclusion : Clinical spectrum of JME appears to be different in India. We suggest that it should be strongly suspected in juvenile patients of generalized epilepsy not responding to treatment.

  9. Participation of CD161(+) and invariant natural killer T cells in pediatric asthma exacerbations.

    Science.gov (United States)

    Carpio-Pedroza, Juan C; Vaughan, Gilberto; del Rio-Navarro, Blanca E; del Río-Chivardí, Jaime M; Vergara-Castañeda, Arely; Jiménez-Zamudio, Luis A; Morales-Flores, Amelia; Rodríguez-Moreno, Guadalupe; Ruiz-Tovar, Karina; Fonseca-Coronado, Salvador; Gonçalves Rossi, Livia M; Escobar-Gutiérrez, Alejandro

    2013-01-01

    Asthma has been defined as a disease of chronic airway inflammation in which many cells and cellular products participate with variable degrees of airflow obstruction and hyperresponsiveness that lead to recurrent episodes of wheezing, breathlessness, chest tightness, and coughing. Prominent among these cellular elements are two cell types referred to as the invariant natural killer T (iNKT) cells and a subpopulation of T cells expressing the molecule CD161, which are both thought to play a role in the pathogenesis of asthma. Although the presence of iNKT and other CD161(+) cells in murine models has been associated with asthma, relatively few studies have been performed in the adult patient with asthma that have been often conflicting and even fewer studies are available in children. The present study was performed to investigate the peripheral blood frequencies of iNKT and CD161(+) T cells in children with asthma. A total of 35 children, 19 stable asthmatic patients, 6 who had experienced an asthmatic attack within 24 hours and had not received any treatment, and 10 healthy controls, aged 6-12 years, were enrolled in the study. iNKT and CD161(+) T-cell frequencies in blood were measured together with quantitative levels of IL-4 and interferon (IFN) γ using a cytofluorimetric approach. The results show that iNKT cells are increased in pediatric asthmatic patients undergoing exacerbations of asthma. These cells also produced less IFN-γ and more IL-4 than children with stable asthma and in healthy control children. These results suggest that iNKT cells might participate in the development of the asthmatic exacerbations. The increased production of IL-4 in conjunction with the decrease of IFN-γ may be mechanistically responsible, at least partially, for the heightening of the immunologic response leading to the asthmatic attack in children. Knowledge of these interactive mechanisms involving the iNKT cell and our understanding of its role in the exacerbation of

  10. Optimizing antibiotic selection in treating COPD exacerbations

    Directory of Open Access Journals (Sweden)

    Attiya Siddiqi

    2008-03-01

    Full Text Available Attiya Siddiqi, Sanjay SethiDivision of Pulmonary, Critical Care and Sleep Medicine, Department of Medicine, Veterans Affairs Western New York Health Care System and University of Buffalo, State University of New York, Buffalo, New York, USAAbstract: Our understanding of the etiology, pathogenesis and consequences of acute exacerbations of chronic obstructive pulmonary disease (COPD has increased substantially in the last decade. Several new lines of evidence demonstrate that bacterial isolation from sputum during acute exacerbation in many instances reflects a cause-effect relationship. Placebo-controlled antibiotic trials in exacerbations of COPD demonstrate significant clinical benefits of antibiotic treatment in moderate and severe episodes. However, in the multitude of antibiotic comparison trials, the choice of antibiotics does not appear to affect the clinical outcome, which can be explained by several methodological limitations of these trials. Recently, comparison trials with nontraditional end-points have shown differences among antibiotics in the treatment of exacerbations of COPD. Observational studies that have examined clinical outcome of exacerbations have repeatedly demonstrated certain clinical characteristics to be associated with treatment failure or early relapse. Optimal antibiotic selection for exacerbations has therefore incorporated quantifying the risk for a poor outcome of the exacerbation and choosing antibiotics differently for low risk and high risk patients, reserving the broader spectrum drugs for the high risk patients. Though improved outcomes in exacerbations with antibiotic choice based on such risk stratification has not yet been demonstrated in prospective controlled trials, this approach takes into account concerns of disease heterogeneity, antibiotic resistance and judicious antibiotic use in exacerbations.Keywords: COPD, exacerbation, bronchitis, antibiotics

  11. [Predictive factors associated with severity of asthma exacerbations].

    Science.gov (United States)

    Atiş, Sibel; Kaplan, Eylem Sercan; Ozge, Cengiz; Bayindir, Suzan

    2008-01-01

    Several factors have been accused for asthma exacerbations, however, very few studies have evaluated whether different factors predict severity of asthma exacerbation. We aimed to determine the predictive factors for severity of asthma exacerbation. Retrospective analysis of data on 93 patients visited our emergency-department because of asthma exacerbation was reviewed. Hospitalization in intensive care unit and/or intubation because of asthma was accepted as the criteria for severe exacerbation. Logistic regression analysis estimated the strength of association of each variable, potentially related to severe asthmatic exacerbation, with severe/very severe as compared to mild/moderate asthmatic exacerbation. Independent variables included in the analysis were age, sex, smoking history, inhaler steroid using, compliance with medication, chronic asthma severity, presence of additional atopic diseases, prick test positivity, provocative factors, number of short-acting beta(2)-agonist using, number of visits to emergency department for asthma over one year period, previous severe exacerbation, pulmonary functions, and blood eosinophil count. 20 were severe/very severe and 73 mild/moderate asthmatic exacerbation. Frequent using of short-acting beta(2)-agonist (OR= 1.5, 95% CI= 1.08-5.3, p= 0.003), noncompliance with medication (OR= 3.6, 95% CI= 1.3-9.9, p= 0.013), previous severe asthmatic exacerbation (OR= 3.8, 95% CI= 1.48-10.01, p= 0.005) and recent admission to hospital (OR= 2.9, 95% CI= 1.07-8.09, p= 0.037) were found to be predictive factors for severe asthmatic exacerbation. Different predictive factors, in particular frequent using of short-acting beta(2)-agonist and noncompliance with medication may be associated with severe asthma exacerbations compared to milder exacerbations. This suggests different mechanisms are responsible for severity of asthma exacerbation.

  12. [Warning symptoms of asthma attack and asthma self-management: a national asthma control survey from China].

    Science.gov (United States)

    Lin, J T; Wang, W Q; Zhou, X; Wang, C Z; Huang, M; Cai, S X; Chen, P; Lin, Q C; Zhou, J Y; Gu, Y H; Yuan, Y D; Sun, D J; Yang, X H; Yang, L; Huo, J M; Chen, Z C; Jiang, P; Zhang, J; Ye, X W; Liu, H G; Tang, H P; Liu, R Y; Liu, C T; Zhang, W; Hu, C P; Chen, Y Q; Liu, X J; Dai, L M; Zhou, W; Huang, Y J; Xu, J Y

    2017-08-08

    Objective: To investigate warning symptoms of asthma attack and evaluate asthma self-management status of asthma patients in urban China. Methods: A multi-center, cross-sectional, questionnaire-based survey was carried out from 30 general hospitals dispersed in 30 provinces of mainland China (except for Tibet) during Oct 2015 to May 2016. Information of frequency and warning symptoms of asthma attack, the time from warning symptoms to asthma attack, the impact of asthma attack and asthma self-management were collected from asthma patients of outpatient department. Results: Altogether 3 875 asthmatic outpatients were recruited. 78.1% (3 026/3 875) of the patients reported restriction of exercise and daily activities during asthma exacerbation. 82.5% (3 160/3 829) of the patients had warning symptoms before asthma attack, the most common warning symptoms were cough, chest tightness and shortness of breath. The median time from warning symptoms to asthma attack was 2 h, the mean time was 90 h. Only 4.4% (167/3 829) of the patients had definite confidence to control asthma when symptoms deteriorated. 76.7% (2 937/3 828) of the patients used medications to control asthma when asthma symptoms deteriorated. Medication choice: inhaled corticosteroid (ICS) + formoterol 45.8% (1 776/3 875), short-acting beta-agonist (SABA) 23.9% (927/3 875). Conclusions: Most asthma patients have warning symptoms before asthma attack, the most common symptoms are cough, chest tightness and shortness of breath. The proportion of patients conducting effective asthma self-management remains low.

  13. Research Article Special Issue

    African Journals Online (AJOL)

    2016-05-15

    May 15, 2016 ... with myoclonic stand on two legs and fall to the side, stage 5: tonic and clonic falling into the public attacks. ..... of descriptive terminology for ictal semiology: report of the ILAE Task Force on. Classification and ... [17]Porter BE.

  14. Mutations in the GABA Transporter SLC6A1 Cause Epilepsy with Myoclonic-Atonic Seizures

    Science.gov (United States)

    Carvill, Gemma L.; McMahon, Jacinta M.; Schneider, Amy; Zemel, Matthew; Myers, Candace T.; Saykally, Julia; Nguyen, John; Robbiano, Angela; Zara, Federico; Specchio, Nicola; Mecarelli, Oriano; Smith, Robert L.; Leventer, Richard J.; Møller, Rikke S.; Nikanorova, Marina; Dimova, Petia; Jordanova, Albena; Petrou, Steven; Helbig, Ingo; Striano, Pasquale; Weckhuysen, Sarah; Berkovic, Samuel F.; Scheffer, Ingrid E.; Mefford, Heather C.

    2015-01-01

    GAT-1, encoded by SLC6A1, is one of the major gamma-aminobutyric acid (GABA) transporters in the brain and is responsible for re-uptake of GABA from the synapse. In this study, targeted resequencing of 644 individuals with epileptic encephalopathies led to the identification of six SLC6A1 mutations in seven individuals, all of whom have epilepsy with myoclonic-atonic seizures (MAE). We describe two truncations and four missense alterations, all of which most likely lead to loss of function of GAT-1 and thus reduced GABA re-uptake from the synapse. These individuals share many of the electrophysiological properties of Gat1-deficient mice, including spontaneous spike-wave discharges. Overall, pathogenic mutations occurred in 6/160 individuals with MAE, accounting for ∼4% of unsolved MAE cases. PMID:25865495

  15. Prevention of exacerbations of COPD with pharmacotherapy

    Directory of Open Access Journals (Sweden)

    M. Miravitlles

    2010-06-01

    Full Text Available Exacerbations are a frequent event in the evolution of chronic obstructive pulmonary disease (COPD patients. Individuals with COPD have a mean of 1–3 episodes per year, some of which lead to hospital admission and may even be a cause of death. The importance of COPD exacerbations has become increasingly apparent due to the impact these episodes have on the natural history of disease. It is now known that frequent exacerbations can adversely affect health-related quality of life and short- and long-term pulmonary function. Optimising treatment for stable COPD will help to reduce exacerbations. Long-acting bronchodilators, alone or combined with inhaled corticosteroids, have demonstrated efficacy in reducing the rate of exacerbations in patients with COPD. Other innovative approaches are being investigated, such as the long-term use of macrolides or the use of antibiotics in an effort to suppress bronchial colonisation and consequent exacerbations. Other drugs, such as mucolytics and immunomodulators, have recently provided positive results. Non-pharmacological interventions such as rehabilitation, self-management plans and the maintenance of high levels of physical activity in daily life are also useful strategies to prevent exacerbations in patients with COPD and should be implemented in regular clinical practice.

  16. Two cases of childhood narcolepsy mimicking epileptic seizures in video-EEG/EMG.

    Science.gov (United States)

    Yanagishita, Tomoe; Ito, Susumu; Ohtani, Yui; Eto, Kaoru; Kanbayashi, Takashi; Oguni, Hirokazu; Nagata, Satoru

    2018-06-06

    Narcolepsy is characterized by excessive sleepiness, hypnagogic hallucinations, and sleep paralysis, and can occur with or without cataplexy. Here, we report two children with narcolepsy presenting with cataplexy mimicking epileptic seizures as determined by long-term video-electroencephalography (EEG) and electromyography (EMG) monitoring. Case 1 was a 15-year-old girl presenting with recurrent episodes of "convulsions" and loss of consciousness, who was referred to our hospital with a diagnosis of epilepsy showing "convulsions" and "complex partial seizures". The long-term video-polygraph showed a clonic attack lasting for 15 s, which corresponded to 1-2 Hz with interruption of mentalis EMG discharges lasting for 70-300 ms without any EEG changes. Narcolepsy was suspected due to the attack induced by hearty laughs and the presence of sleep attacks, and confirmed by low orexin levels in cerebrospinal fluid (CSF). Case 2 was an 11-year-old girl presenting with recurrent episodes of myoclonic attacks simultaneously with dropping objects immediately after hearty laughs, in addition to sleep attacks, hypnagogic hallucinations, and sleep paralysis. The long-term video-polygraph showed a subtle attack, characterized by dropping chopsticks from her hand, which corresponded to an interruption of ongoing deltoid EMG discharges lasting 140 ms without any EEG changes. A diagnosis of narcolepsy was confirmed by the low orexin levels in CSF. These cases demonstrate that children with narcolepsy may have attacks of cataplexy that resemble clonic or myoclonic seizures. Copyright © 2018 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  17. Virus-induced exacerbations in asthma and COPD

    Directory of Open Access Journals (Sweden)

    Daisuke eKurai

    2013-10-01

    Full Text Available Chronic obstructive pulmonary disease (COPD is characterized by chronic airway inflammation and/or airflow limitation due to pulmonary emphysema. Chronic bronchitis, pulmonary emphysema, and bronchial asthma may all be associated with airflow limitation; therefore, exacerbation of asthma may be associated with the pathophysiology of COPD. Furthermore, recent studies have suggested that the exacerbation of asthma, namely virus-induced asthma, may be associated with a wide variety of respiratory viruses.COPD and asthma have different underlying pathophysiological processes and thus require individual therapies. Exacerbation of both COPD and asthma, which are basically defined and diagnosed by clinical symptoms, is associated with a rapid decline in lung function and increased mortality. Similar pathogens, including human rhinovirus, respiratory syncytial virus, influenza virus, parainfluenza virus and coronavirus, are also frequently detected during exacerbation of asthma and/or COPD. Immune response to respiratory viral infections, which may be related to the severity of exacerbation in each disease, varies in patients with both COPD and asthma. In this regard, it is crucial to recognize and understand both the similarities and differences of clinical features in patients with COPD and/or asthma associated with respiratory viral infections, especially in the exacerbative stage.In relation to definition, epidemiology, and pathophysiology, this review aims to summarize current knowledge concerning exacerbation of both COPD and asthma by focusing on the clinical significance of associated respiratory virus infections.

  18. The molecular epidemiology of respiratory viruses associated with asthma attacks: A single-center observational study in Japan.

    Science.gov (United States)

    Saraya, Takeshi; Kimura, Hirokazu; Kurai, Daisuke; Ishii, Haruyuki; Takizawa, Hajime

    2017-10-01

    Few reports have described the significance of viral respiratory infections (VRIs) in exacerbation of asthma in adult patients. The aim of this study was to elucidate the profiles of VRIs in adult patients with asthma along with their molecular epidemiology.A cross-sectional observational study was conducted at Kyorin University Hospital from August 2012 to May 2015. To identify respiratory pathogens in inpatients and outpatients suffering from asthma attacks, RT-PCR/sequencing/phylogenetic analysis methods were applied alongside conventional microbiological methods. Phylogenetic and pairwise distance analyses of 10 viruses were performed.A total of 106 asthma attack patients enrolled in this study in both inpatient (n = 49) and outpatient (n = 57) settings. The total 106 respiratory samples were obtained from nasopharyngeal swab (n = 68) or sputum (n = 38). Among these, patients with virus alone (n = 39), virus and bacterial (n = 5), and bacterial alone (n = 5) were identified. The ratio of virus-positive patients in inpatient or outpatient to the total cases were 31.1% (n = 33) and 10.4% (n = 11), respectively. The frequency of virus-positive patients was significantly higher in inpatients (75.3%, n = 33) than in outpatients (19.3%, n = 11). Major VRIs included human rhinovirus (HRV) (n = 24), human metapneumovirus (hMPV) (n = 9), influenza virus (Inf-V) (n = 8), and respiratory syncytial virus (RSV) (n = 3) infections with seasonal variations. HRV-A and HRV-C were the most commonly detected viruses, with wide genetic divergence on phylogenetic analysis.Asthmatic exacerbations in adults are highly associated with VRIs such as HRV-A or HRV-C, hMPV, RSV, and Inf-V infections with seasonal variations and genetic divergence, but similar frequencies of VRIs occurred in asthma attack patients throughout the seasons.

  19. Acute exacerbations of chronic bronchitis: a pharmacoeconomic review of antibacterial use.

    Science.gov (United States)

    Morris, Stephen; Anderson, Pippa; Irwin, Debra E

    2002-01-01

    Chronic bronchitis is a common problem affecting a large proportion of the adult population. People with chronic bronchitis are subject to recurrent attacks of bronchial inflammation called acute exacerbations of chronic bronchitis (AECBs). In patients with AECBs, symptoms may worsen due to a bacterial infection; the exacerbation is then known as an acute bacterial exacerbation of chronic bronchitis (ABECB). ABECBs are thought to be controllable through the use of antibacterial agents. In this paper we review current evidence on the cost of chronic bronchitis and AECBs, the cost effectiveness of antibacterials in the management of ABECB, and the factors that may affect the cost-effectiveness of antibacterials in the management of ABECB. We find that the number of economic evaluations conducted in this area is small. Of the few economic evaluations that have been conducted there has been only one prospective economic evaluation based on a clinical trial. The remainder are simple decision analysis-based modelling studies or retrospective database studies. Our principle findings are as follows: a key factor affecting the cost-effective use of antibacterials in the management of ABECB is the definitive diagnosis of the condition. Unfortunately, diagnosing a bacterial cause of an AECB is difficult, which presents problems in ensuring that antibacterials are not prescribed unnecessarily;current evidence suggests but does not prove that use of more effective but more costly first-line antibacterials may be relatively cost effective and may minimise overall expenditure by reducing the high costs associated with treatment failure;chronic bronchitis and AECB have a significant and negative physical and psychological effect on health-related quality of life. In conclusion, the small number of economic evaluations conducted in this area, coupled with the nature of the design of these studies, precludes a definitive statement recommending which specific antibacterial should be

  20. [The effect of fenspiride on the number of exacerbations and the time of first exacerbation in patients with chronic bronchitis].

    Science.gov (United States)

    Pirozyński, Michał; Skucha, Wojciech; Słomiński, Marek; Chyczewska, Elzbieta; Malinowski, Janusz; Nowak, Dariusz; Bartmińiski, Wojciech; Pachocki, Robert

    2005-08-01

    The aim of the work was evaluation of efficacy of fenspiride b.i.d. on the number of exacerbations and the time to the first exacerbation in patients with chronic bronchitis. Randomized, multicentre study controlled versus placebo was carried out in 12 centers in Poland. All patients, 89 females and 68 males aged between 20 and 74, were treated with fenspiride at the dose of 160 mg/day for a period of 6 months. The following symptoms were recorded every month in order to evaluate the therapeutic efficacy: sputum quality and quantity, cough intensity, dyspnea and bronchospasm. Based on these symptoms diagnosis of exacerbation was performed according to American Thoracic Society criteria. Quality and quantity of sputum and cough significantly improved in the fenspiride group (comparing to the placebo group p= 0.027 and p = 0.049 adequately for sputum and cough). A significant difference between groups was observed in the number of exacerbation episodes and their duration. In the fenspiride group there were 0.53 episodes of exacerbation compared with 1.12 episodes in the placebo group (p = 0.038). Mean duration of exacerbation was 3.3 days in the fenspiride group and 7.3 days in the placebo treated patients (p = 0.034). Time to the first exacerbation differed between groups, but this difference was not statistically significant. Number of side effects observed did not differ between groups. Fenspiride treatment was assessed as relatively effective in terms of influence on exacerbations, and well tolerated during six month therapy.

  1. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  2. Severe exacerbations and decline in lung function in asthma

    DEFF Research Database (Denmark)

    O'Byrne, Paul M; Pedersen, Søren; Lamm, Carl Johan

    2009-01-01

    RATIONALE: To evaluate the association between asthma exacerbations and the decline in lung function, as well as the potential effects of an inhaled corticosteroid, budesonide, on exacerbation-related decline in patients with asthma. OBJECTIVES: To determine whether severe asthma exacerbations...... with low-dose inhaled budesonide prevents severe asthma-related events (exacerbations requiring hospitalization or emergency treatment) and decline in lung function. MEASUREMENTS AND MAIN RESULTS: There were 315 patients who experienced at least one severe asthma exacerbation, of which 305 were analyzable...... of reduction afforded by budesonide, in patients who experienced at least one severe asthma-related event compared with those who did not, was statistically significant (P = 0.042). CONCLUSIONS: Severe asthma exacerbations are associated with a more rapid decline in lung function. Treatment with low doses...

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. Prevention of Acute Exacerbations of COPD

    Science.gov (United States)

    Bourbeau, Jean; Diekemper, Rebecca L.; Ouellette, Daniel R.; Goodridge, Donna; Hernandez, Paul; Curren, Kristen; Balter, Meyer S.; Bhutani, Mohit; Camp, Pat G.; Celli, Bartolome R.; Dechman, Gail; Dransfield, Mark T.; Fiel, Stanley B.; Foreman, Marilyn G.; Hanania, Nicola A.; Ireland, Belinda K.; Marchetti, Nathaniel; Marciniuk, Darcy D.; Mularski, Richard A.; Ornelas, Joseph; Stickland, Michael K.

    2015-01-01

    BACKGROUND: COPD is a major cause of morbidity and mortality in the United States as well as throughout the rest of the world. An exacerbation of COPD (periodic escalations of symptoms of cough, dyspnea, and sputum production) is a major contributor to worsening lung function, impairment in quality of life, need for urgent care or hospitalization, and cost of care in COPD. Research conducted over the past decade has contributed much to our current understanding of the pathogenesis and treatment of COPD. Additionally, an evolving literature has accumulated about the prevention of acute exacerbations. METHODS: In recognition of the importance of preventing exacerbations in patients with COPD, the American College of Chest Physicians (CHEST) and Canadian Thoracic Society (CTS) joint evidence-based guideline (AECOPD Guideline) was developed to provide a practical, clinically useful document to describe the current state of knowledge regarding the prevention of acute exacerbations according to major categories of prevention therapies. Three key clinical questions developed using the PICO (population, intervention, comparator, and outcome) format addressed the prevention of acute exacerbations of COPD: nonpharmacologic therapies, inhaled therapies, and oral therapies. We used recognized document evaluation tools to assess and choose the most appropriate studies and to extract meaningful data and grade the level of evidence to support the recommendations in each PICO question in a balanced and unbiased fashion. RESULTS: The AECOPD Guideline is unique not only for its topic, the prevention of acute exacerbations of COPD, but also for the first-in-kind partnership between two of the largest thoracic societies in North America. The CHEST Guidelines Oversight Committee in partnership with the CTS COPD Clinical Assembly launched this project with the objective that a systematic review and critical evaluation of the published literature by clinical experts and researchers in

  5. Antibiotics usefulness and choice in BPCO acute exacerbation

    Directory of Open Access Journals (Sweden)

    Bruno Tartaglino

    2005-10-01

    Full Text Available Although the debate on the role of bacterial infections and antibiotic treatment in AE-COPD remains open, there is evidence that the persistence of bacteria after acute exacerbation (residual bacterial colony influences the frequency and severity of subsequent acute exacerbation and that antibiotic treatment that induces faster and more complete eradication produces better clinical outcomes. New aspects must now be considered, given that COPD is a chronic illness subject to acute exacerbations of varying frequencies and that acute exacerbations correspond to functional respiratory deterioration. One of the parameters that is currently acquiring clinical relevance is the interval free of infection (IFI, the period that elapses between one acute exacerbation and the next, caused by bacterial infection. Another guiding concept in the choice of antibiotic treatment is that not all patients benefit in the same way; those requiring more aggressive treatment are most likely to be those with FEV1 < 50%, frequent exacerbations (> 3/year treated with antibiotics, relevant co-morbidity, under chronic steroid treatment, etc., for these patients it is recommended to administer antibiotics active on the three most common pathogens (in particular H. influenzae, considering the resistance acquired in recent years, and on Pseudomomias aeruginosa.

  6. Heterogeneity of anatomic regions by MR volumetry in juvenile myoclonic epilepsy.

    Science.gov (United States)

    Swartz, B E; Spitz, J; Vu, A L; Mandelkern, M; Su, M L

    2016-10-01

    To investigate brain volumes in patients with well-characterized juvenile myoclonic epilepsy (JME). We studied the MRI images of seventeen subjects with EEG and clinically defined JME and seventeen age- and sex-matched controls using voxel-based morphometry (VBM) and automated and manual volumetry. We found no significant group differences in the cortical volumes by automated techniques for all regions or for the whole brain. However, we found a larger pulvinar nucleus in JME using VBM with small volume correction and a larger thalamus with manual volumetry (P = 0.001; corrected two-tailed t-test). By analysing the individual subjects, we determined that considerable heterogeneity exists even in this highly selected group. Histograms of all JME and matched control regions' volumes showed more subjects with JME had smaller hippocampi and larger thalami (P < 0.05; chi-square). Subjects in whom the first seizure was absence were more likely to have smaller hippocampi than their matched control, while those without absences showed no differences (P < 0.05, chi-square). There is ample evidence for frontal cortical thalamic network changes in JME, but subcortical structural differences were more distinct in this group. Given the heterogeneity of brain volumes in the clinical population, further advancement in the field will require the examination of stringent genetically controlled populations. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. Exacerbation heterogeneity in COPD: subgroup analyses from the FLAME study

    Directory of Open Access Journals (Sweden)

    Vogelmeier CF

    2018-04-01

    Full Text Available Claus F Vogelmeier,1 Kenneth R Chapman,2 Marc Miravitlles,3 Nicolas Roche,4 Jørgen Vestbo,5 Chau Thach,6 Donald Banerji,6 Robert Fogel,6 Francesco Patalano,7 Petter Olsson,8 Konstantinos Kostikas,7 Jadwiga A Wedzicha9 1Member of the German Center for Lung Research (DZL, Department of Medicine, Pulmonary and Critical Care Medicine, University Medical Center Giessen and Marburg, Philipps-Universität Marburg, Marburg, Germany; 2Asthma and Airway Centre, University Health Network and University of Toronto, Toronto, ON, Canada; 3Pneumology Department, Hospital Universitari Vall d’Hebron, CIBER de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 4Service de Pneumologie AP-HP, Cochin Hospital, University Paris Descartes (EA2511, Paris, France; 5Institute of Infection, Immunity and Respiratory Medicine, The University of Manchester and Manchester University NHS Foundation Trust, Manchester, UK; 6Novartis Pharmaceuticals Corporation, East Hanover, NJ, USA; 7Novartis Pharma AG, Basel, Switzerland; 8Novartis Sverige AB, Täby, Sweden; 9National Heart and Lung Institute, Imperial College London, London, UK Background: The FLAME study compared once-daily indacaterol/glycopyrronium (IND/GLY 110/50 µg with twice-daily salmeterol/fluticasone (SFC 50/500 µg in symptomatic patients with moderate to very severe COPD and a history of exacerbations in the previous year. Methods: This prespecified and post hoc subgroup analysis evaluated treatment efficacy on 1 moderate/severe exacerbations according to prior exacerbation history and treatment, and 2 types of exacerbations according to health care resource utilization (HCRU during 1-year follow-up. Results: IND/GLY reduced the rate of moderate/severe exacerbations versus SFC in patients with a history of 1 exacerbation (rate ratio [RR]: 0.83, 95% CI: 0.75–0.93, ≥2 exacerbations (RR: 0.85, 95% CI: 0.70–1.03 and ≥2 exacerbations or ≥1 hospitalization in the previous year (RR: 0.86, 95% CI: 0.74

  8. Characterisation and prevention of exacerbations in frequently exacerbating patienst with COPD

    NARCIS (Netherlands)

    S. Uzun (Sevim)

    2014-01-01

    markdownabstract__Abstract__ Chronic obstructive pulmonary disease (COPD) is a disease which is characterised by airway inflammation and progressive airflow limitation with poor reversibility. Periods of acute deterioration lie in the natural course of the disease and are called exacerbations.

  9. Neuropsychological profile of patients with juvenile myoclonic epilepsy: a controlled study of 50 patients.

    Science.gov (United States)

    Pascalicchio, Tatiana Frascareli; de Araujo Filho, Gerardo M; da Silva Noffs, Maria Helena; Lin, Katia; Caboclo, Luís Otávio S F; Vidal-Dourado, Marcos; Ferreira Guilhoto, Laura M F; Yacubian, Elza Márcia Targas

    2007-03-01

    The purpose of this study was to verify possible cognitive dysfunction in patients with juvenile myoclonic epilepsy (JME) and its relationship to factors related to epilepsy and schooling. Fifty subjects diagnosed with JME and 50 controls underwent neuropsychological assessment evaluating intellectual functions, attention, memory, executive functions, and language. The patients were further divided into two subgroups on the basis of educational level: 11 years of formal education. Participants diagnosed with JME scored significantly below age-, education-, and gender-matched controls on neuropsychological measures of attention, immediate verbal memory, mental flexibility, control of inhibition, working memory, processing speed, verbal delayed memory, visual delayed memory, naming, and verbal fluency. A positive correlation was observed between duration of epilepsy and cognitive decline. However, in the group of patients with >11 years of education, this correlation was not significant. In this series of patients with JME, neuropsychological evaluation suggests widespread cognitive dysfunction outside the limits of the frontal lobes. The duration of epilepsy correlated with cognitive decline, and patients with higher education manifested less progression of deficits.

  10. Severe angina pectoris in asthma attack: a case report.

    Science.gov (United States)

    Nabavizadeh, Seyed Hesamedin; Farahbakhsh, Nazanin; Fazel, Ali; Mosavat, Fereshteh; Anushiravani, Amir

    2016-06-01

    Asthma is a chronic inflammatory disorder of the airways related to the obstruction of reversible airflow. Asthma presents as recurrent attacks of cough and dyspnea. Poor control causes recurrent admissions to the ICU, and mortality is related to poor drug compliance and follow-up. Angina pectoris is a syndrome of recurrent chest discomfort related to myocardial ischemia. The presence of these two disorders rarely has been reported. We reported a 12-year-old boy who was referred with exacerbation of asthma and developed angina pectoris during hospitalization. He had labored breathing and diffuse wheezing. During treatment of the asthma, the patient developed severe chest pain due to shunt formation and coronary hypoxia, caused by the sole administration of ventolin, since oxygen had been disconnected. After receiving appropriate therapy, both his asthma and angina recovered, and, to date, he has not experienced angina pectoris again.

  11. Myasthenia gravis exacerbation and diarrhea associated with erythromycin treatment

    Directory of Open Access Journals (Sweden)

    Sora Yasri

    2017-01-01

    Full Text Available An important problem in management of the case with myasthenia gravis (MG is the control of exacerbation. There are several possible causes of exacerbation of MG including the use of drug. Here, the authors report a case of MG exacerbation and diarrhea associated with erythromycin treatment.

  12. Determinants of low risk of asthma exacerbation during pregnancy

    DEFF Research Database (Denmark)

    Ali, Z; Nilas, L; Ulrik, C S

    2018-01-01

    of Asthma during Pregnancy (MAP) programme at Hvidovre Hospital since 2007. Assessment of asthma control, adjustment of treatment, spirometry and measurement of exhaled nitric oxide (FENO) were performed, and baseline characteristics and exacerbation history were collected at enrolment. Determinants of low......: Clinically stable asthma at enrolment, together with no history of previous exacerbations and no prescribed controller medication, is a determinant of low risk of an asthma exacerbation during pregnancy, which may guide clinicians in individualizing surveillance of asthma during pregnancy.......BACKGROUND: Assessment of asthma control every 4-6 weeks during pregnancy is recommended to reduce risk of exacerbation, and by that improve outcome. OBJECTIVE: To identify determinants of pregnancies with low risk of asthma exacerbation. METHODS: All pregnant women enrolled into the Management...

  13. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  14. Detection of rhinovirus-associated asthma exacerbations using ...

    African Journals Online (AJOL)

    Ehab

    between common viral respiratory infections and asthma exacerbations. Respiratory viruses have ... positive Rhinovirus RT-PCR test and 4 (50%) of the HRV positive patients were of the ... reaction volume was 50 µl, and the reaction mixture contained 0.9 ..... significance in asthma exacerbation and airway remodeling.

  15. Incidence and risk factors for exacerbations of asthma during pregnancy

    Directory of Open Access Journals (Sweden)

    Ali Z

    2013-05-01

    Full Text Available Zarqa Ali, Charlotte Suppli UlrikDepartment of Pulmonary Medicine, Hvidovre Hospital and University of Copenhagen, Copenhagen, DenmarkBackground: Asthma is one of the most common chronic diseases among pregnant women. Acute exacerbations of asthma during pregnancy have an unfavorable impact on pregnancy outcome. This review provides an overview of current knowledge of incidence, mechanisms, and risk factors for acute exacerbations of asthma during pregnancy.Methods: A narrative literature review was carried out using the PubMed database.Results: During pregnancy, up to 6% of women with asthma are hospitalized for an acute exacerbation. The maternal immune system is characterized by a very high T-helper-2:T-helper-1 cytokine ratio during pregnancy and thereby provides an environment essential for fetal survival but one that may aggravate asthma. Cells of the innate immune system such as monocytes and neutrophils are also increased during pregnancy, and this too can exacerbate maternal asthma. Severe or difficult-to-control asthma appears to be the major risk factor for exacerbations during pregnancy, but studies also suggest that nonadherence with controller medication and viral infections are important triggers of exacerbations during pregnancy. So far, inconsistent findings have been reported regarding the effect of fetal sex on exacerbations during pregnancy. Other risk factors for exacerbation during pregnancy include obesity, ethnicity, and reflux, whereas atopy does not appear to be a risk factor.Discussion: The incidence of asthma exacerbations during pregnancy is disturbingly high. Severe asthma – better described as difficult-to-control asthma – nonadherence with controller therapy, viral infections, obesity, and ethnicity are likely to be important risk factors for exacerbations of asthma during pregnancy, whereas inconsistent findings have been reported with regard to the importance of sex of the fetus.Keywords: acute exacerbations

  16. EFHC1, a protein mutated in juvenile myoclonic epilepsy, associates with the mitotic spindle through its N-terminus

    International Nuclear Information System (INIS)

    Nijs, Laurence de; Lakaye, Bernard; Coumans, Bernard; Leon, Christine; Ikeda, Takashi; Delgado-Escueta, Antonio V.; Grisar, Thierry; Chanas, Grazyna

    2006-01-01

    A novel gene, EFHC1, mutated in juvenile myoclonic epilepsy (JME) encodes a protein with three DM10 domains of unknown function and one putative EF-hand motif. To study the properties of EFHC1, we expressed EGFP-tagged protein in various cell lines. In interphase cells, the fusion protein was present in the cytoplasm and in the nucleus with specific accumulation at the centrosome. During mitosis EGFP-EFHC1 colocalized with the mitotic spindle, especially at spindle poles and with the midbody during cytokinesis. Using a specific antibody, we demonstrated the same distribution of the endogenous protein. Deletion analyses revealed that the N-terminal region of EFHC1 is crucial for the association with the mitotic spindle and the midbody. Our results suggest that EFHC1 could play an important role during cell division

  17. Fibrinogen and alpha(1)-antitrypsin in COPD exacerbations

    DEFF Research Database (Denmark)

    Sylvan Ingebrigtsen, Truls; Marott, J. L.; Rode, L.

    2015-01-01

    Background We tested the hypotheses that fibrinogen and alpha(1)-antitrypsin are observationally and genetically associated with exacerbations in COPD. Methods We studied 13 591 individuals with COPD from the Copenhagen General Population Study (2003-2013), of whom 6857 were genotyped for FGB -455...... and exacerbations in instrumental variable analyses. Results Elevated fibrinogen and alpha(1)-antitrypsin levels were associated with increased risk of exacerbations in COPD, HR=1.14 (1.07 to 1.22, p...

  18. Acute kidney injury in stable COPD and at exacerbation

    Directory of Open Access Journals (Sweden)

    Barakat MF

    2015-09-01

    Full Text Available MF Barakat,1 HI McDonald,1 TJ Collier,1 L Smeeth,1 D Nitsch,1 JK Quint1,2 1Faculty of Epidemiology and Population Health, London School of Hygiene and Tropical Medicine, 2Department of Respiratory Epidemiology, Occupational Medicine and Public Health, National Heart and Lung Institute, Imperial College London, London, UK Background: While acute kidney injury (AKI alone is associated with increased mortality, the incidence of hospital admission with AKI among stable and exacerbating COPD patients and the effect of concurrent AKI at COPD exacerbation on mortality is not known.Methods: A total of 189,561 individuals with COPD were identified from the Clinical Practice Research Datalink. Using Poisson and logistic regressions, we explored which factors predicted admission for AKI (identified in Hospital Episode Statistics in this COPD cohort and concomitant AKI at a hospitalization for COPD exacerbation. Using survival analysis, we investigated the effect of concurrent AKI at exacerbation on mortality (n=36,107 and identified confounding factors.Results: The incidence of AKI in the total COPD cohort was 128/100,000 person-years. The prevalence of concomitant AKI at exacerbation was 1.9%, and the mortality rate in patients with AKI at exacerbation was 521/1,000 person-years. Male sex, older age, and lower glomerular filtration rate predicted higher risk of AKI or death. There was a 1.80 fold (95% confidence interval: 1.61, 2.03 increase in adjusted mortality within the first 6 months post COPD exacerbation in patients suffering from AKI and COPD exacerbation compared to those who were AKI free.Conclusion: In comparison to previous studies on general populations and hospitalizations, the incidence and prevalence of AKI is relatively high in COPD patients. Coexisting AKI at exacerbation is prognostic of poor outcome. Keywords: acute renal failure, mortality, emphysema, chronic bronchitis, prognosis

  19. COPD exacerbations by disease severity in England

    Directory of Open Access Journals (Sweden)

    Merinopoulou E

    2016-04-01

    Full Text Available Evie Merinopoulou,1 Mireia Raluy-Callado,1 Sreeram Ramagopalan,1 Sharon MacLachlan,1 Javaria Mona Khalid2 1Real-World Evidence, Evidera, 2Takeda Development Centre Europe Ltd, London, UK Objectives: Exacerbations of chronic obstructive pulmonary disease (COPD are associated with accelerated disease progression and are important drivers of health care resource utilization. The study aimed to quantify the rates of COPD exacerbations in England and assess health care resource utilization by severity categories according to the Global Initiative for Chronic Obstructive Lung Disease (GOLD 2013.Methods: Data from the Clinical Practice Research Datalink linked to Hospital Episode Statistics were used to identify patients with a COPD diagnosis aged ≥40 years. Those with complete spirometric, modified Medical Research Council Dyspnea Scale information, and exacerbation history 12 months prior to January 1, 2011 (index date were classified into GOLD severity groups. Study outcomes over follow-up (up to December 31, 2013 were exacerbation rates and resource utilization (general practitioner visits, hospital admissions.Results: From the 44,201 patients in the study cohort, 83.5% were classified into severity levels GOLD A: 33.8%, GOLD B: 21.0%, GOLD C: 18.1%, and GOLD D: 27.0%. Mean age at diagnosis was 66 years and 52.0% were male. Annual exacerbation rates per person-year increased with severity, from 0.83 (95% confidence interval [CI]: 0.81–0.85 for GOLD A to 2.51 (95% CI: 2.47–2.55 for GOLD D. General practitioner visit rates per person-year also increased with severity, from 4.82 (95% CI: 4.74–4.93 for GOLD A to 7.44 (95% CI: 7.31–7.61 for GOLD D. COPD-related hospitalization rates per person-year increased from less symptoms (GOLD A: 0.28, GOLD C: 0.39 to more symptoms (GOLD B: 0.52, GOLD D: 0.84.Conclusion: Patients in the most severe category (GOLD D experienced nearly three times the number of exacerbations and COPD

  20. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  1. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  2. Blood Eosinophils and Exacerbations in Chronic Obstructive Pulmonary Disease

    DEFF Research Database (Denmark)

    Vedel-Krogh, Signe; Nielsen, Sune F; Lange, Peter

    2016-01-01

    RATIONALE: Whether high blood eosinophils are associated with COPD exacerbations among individuals with COPD in the general population is largely unknown. OBJECTIVES: To test the hypothesis that high blood eosinophils predict COPD exacerbations. METHODS: Among 81,668 individuals from the Copenhagen...... General Population Study, we examined 7,225 with COPD based on spirometry. We recorded blood eosinophils at baseline and future COPD exacerbations longitudinally, defined as moderate (short-course treatment of systemic corticosteroids) or severe (hospitalization). We also assessed exacerbation risk...... in a subgroup of 203 COPD individuals with clinical COPD, defined as participants with ≥ 10 pack-years, FEV1

  3. Psychiatric comorbidity in epilepsy: a study comparing patients with mesial temporal sclerosis and juvenile myoclonic epilepsy.

    Science.gov (United States)

    Filho, Gerardo Maria de Araújo; Rosa, Vivianne Pellegrino; Lin, Katia; Caboclo, Luís Otávio Sales Ferreira; Sakamoto, Américo Ceiki; Yacubian, Elza Márcia Targas

    2008-07-01

    We evaluated the frequency of psychiatric disorders (PDs) in a homogenous series of patients with temporal lobe epilepsy with mesial temporal sclerosis (TLE-MTS), as compared with patients with juvenile myoclonic epilepsy (JME), aiming to determine possible differences in psychiatric diagnoses between these two epileptic syndromes. Data from 170 patients with refractory TLE-MTS and from 100 patients with JME were reviewed and compared. The prevalence of PDs was high in both groups of patients with epilepsy: PDs were present in 85 patients with TLE-MTS (50%) and 49 patients with JME (49%). Among the TLE-MTS group, mood (25.8%), psychotic (15.8%), and anxiety (14.1%) disorders were the most frequent diagnoses, whereas anxiety and mood disorders (23 and 19%, respectively) were the most common among patients with JME. Psychoses were significantly associated with MTS (P<0.01) and anxiety disorders with JME (P<0.05). These findings suggest the existence of an anatomic correlation between PDs and brain structures involved in both epilepsy syndromes.

  4. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  5. Long-term Prognosis in COPD Exacerbation: Role of Biomarkers, Clinical Variables and Exacerbation Type.

    Science.gov (United States)

    Grolimund, Eva; Kutz, Alexander; Marlowe, Robert J; Vögeli, Alaadin; Alan, Murat; Christ-Crain, Mirjam; Thomann, Robert; Falconnier, Claudine; Hoess, Claus; Henzen, Christoph; Zimmerli, Werner; Mueller, Beat; Schuetz, Philipp

    2015-06-01

    Long-term outcome prediction in COPD is challenging. We conducted a prospective 5-7-year follow-up study in patients with COPD to determine the association of exacerbation type, discharge levels of inflammatory biomarkers including procalctionin (PCT), C-reactive protein (CRP), white blood cell count (WBC) and plasma proadrenomedullin (ProADM), alone or combined with demographic/clinical characteristics, with long-term all-cause mortality in the COPD setting. The analyzed cohort comprised 469 patients with index hospitalization for pneumonic (n = 252) or non-pneumonic (n = 217) COPD exacerbation. Five-to-seven-year vital status was ascertained via structured phone interviews with patients or their household members/primary care physicians. We investigated predictive accuracy using univariate and multivariate Cox regression models and area under the receiver operating characteristic curve (AUC). After a median [25th-75th percentile] 6.1 [5.6-6.5] years, mortality was 55% (95%CI 50%-59%). Discharge ProADM concentration was strongly associated with 5-7-year non-survival: adjusted hazard ratio (HR)/10-fold increase (95%CI) 10.4 (6.2-17.7). Weaker associations were found for PCT and no significant associations were found for CRP or WBC. Combining ProADM with demographic/clinical variables including age, smoking status, BMI, New York Heart Association dyspnea class, exacerbation type, and comorbidities significantly improved long-term predictive accuracy over that of the demographic/clinical model alone: AUC (95%CI) 0.745 (0.701-0.789) versus 0.727 (0.681-0.772), (p) = .043. In patients hospitalized for COPD exacerbation, discharge ProADM levels appeared to accurately predict 5-7-year all-cause mortality and to improve long-term prognostic accuracy of multidimensional demographic/clinical mortality risk assessment.

  6. Susceptibility to exacerbation in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Hurst, John R; Vestbo, Jørgen; Anzueto, Antonio

    2010-01-01

    BACKGROUND: Although we know that exacerbations are key events in chronic obstructive pulmonary disease (COPD), our understanding of their frequency, determinants, and effects is incomplete. In a large observational cohort, we tested the hypothesis that there is a frequent-exacerbation phenotype...... of follow-up were 0.85 per person for patients with stage 2 COPD (with stage defined in accordance with Global Initiative for Chronic Obstructive Lung Disease [GOLD] stages), 1.34 for patients with stage 3, and 2.00 for patients with stage 4. Overall, 22% of patients with stage 2 disease, 33% with stage 3...... of COPD that is independent of disease severity. METHODS: We analyzed the frequency and associations of exacerbation in 2138 patients enrolled in the Evaluation of COPD Longitudinally to Identify Predictive Surrogate Endpoints (ECLIPSE) study. Exacerbations were defined as events that led a care provider...

  7. Personality traits related to juvenile myoclonic epilepsy: MRI reveals prefrontal abnormalities through a voxel-based morphometry study.

    Science.gov (United States)

    de Araújo Filho, Gerardo Maria; Jackowski, Andrea Parolin; Lin, Katia; Guaranha, Mirian S B; Guilhoto, Laura M F F; da Silva, Henrique Hattori; Caboclo, Luís Otávio Sales Ferreira; Júnior, Henrique Carrete; Bressan, Rodrigo Affonseca; Yacubian, Elza Márcia T

    2009-06-01

    Studies involving juvenile myoclonic epilepsy (JME) patients have demonstrated an elevated prevalence of cluster B personality disorders (PD) characterized as emotional instability, immaturity, unsteadiness, lack of discipline, and rapid mood changes. We aimed to verify a possible correlation between structural brain abnormalities in magnetic resonance image (MRI) and the PD in JME using voxel-based morphometry (VBM). Sixteen JME patients with cluster B PD, 38 JME patients without psychiatric disorders, and 30 healthy controls were submitted to a psychiatric evaluation through SCID I and II and to a MRI scan. Significant reduction in thalami and increase in mesiofrontal and frontobasal regions' volumes were observed mainly in JME patients with PD. Structural alterations of the orbitofrontal cortex (OFC), involved in regulation of mood reactivity, impulsivity, and social behavior, were also observed. This study supports the hypothesis of frontobasal involvement in the pathophysiology of cluster B PD related to JME.

  8. Acute exacerbations and pulmonary hypertension in advanced idiopathic pulmonary fibrosis.

    LENUS (Irish Health Repository)

    Judge, Eoin P

    2012-07-01

    The aim of this study was to evaluate the risk factors for and outcomes of acute exacerbations in patients with advanced idiopathic pulmonary fibrosis (IPF), and to examine the relationship between disease severity and neovascularisation in explanted IPF lung tissue. 55 IPF patients assessed for lung transplantation were divided into acute (n=27) and non-acute exacerbation (n=28) groups. Haemodynamic data was collected at baseline, at the time of acute exacerbation and at lung transplantation. Histological analysis and CD31 immunostaining to quantify microvessel density (MVD) was performed on the explanted lung tissue of 13 transplanted patients. Acute exacerbations were associated with increased mortality (p=0.0015). Pulmonary hypertension (PH) at baseline and acute exacerbations were associated with poor survival (p<0.01). PH at baseline was associated with a significant risk of acute exacerbations (HR 2.217, p=0.041). Neovascularisation (MVD) was significantly increased in areas of cellular fibrosis and significantly decreased in areas of honeycombing. There was a significant inverse correlation between mean pulmonary artery pressure and MVD in areas of honeycombing. Acute exacerbations were associated with significantly increased mortality in patients with advanced IPF. PH was associated with the subsequent development of an acute exacerbation and with poor survival. Neovascularisation was significantly decreased in areas of honeycombing, and was significantly inversely correlated with mean pulmonary arterial pressure in areas of honeycombing.

  9. Predicting Acute Exacerbations in Chronic Obstructive Pulmonary Disease.

    Science.gov (United States)

    Samp, Jennifer C; Joo, Min J; Schumock, Glen T; Calip, Gregory S; Pickard, A Simon; Lee, Todd A

    2018-03-01

    With increasing health care costs that have outpaced those of other industries, payers of health care are moving from a fee-for-service payment model to one in which reimbursement is tied to outcomes. Chronic obstructive pulmonary disease (COPD) is a disease where this payment model has been implemented by some payers, and COPD exacerbations are a quality metric that is used. Under an outcomes-based payment model, it is important for health systems to be able to identify patients at risk for poor outcomes so that they can target interventions to improve outcomes. To develop and evaluate predictive models that could be used to identify patients at high risk for COPD exacerbations. This study was retrospective and observational and included COPD patients treated with a bronchodilator-based combination therapy. We used health insurance claims data to obtain demographics, enrollment information, comorbidities, medication use, and health care resource utilization for each patient over a 6-month baseline period. Exacerbations were examined over a 6-month outcome period and included inpatient (primary discharge diagnosis for COPD), outpatient, and emergency department (outpatient/emergency department visits with a COPD diagnosis plus an acute prescription for an antibiotic or corticosteroid within 5 days) exacerbations. The cohort was split into training (75%) and validation (25%) sets. Within the training cohort, stepwise logistic regression models were created to evaluate risk of exacerbations based on factors measured during the baseline period. Models were evaluated using sensitivity, specificity, and positive and negative predictive values. The base model included all confounding or effect modifier covariates. Several other models were explored using different sets of observations and variables to determine the best predictive model. There were 478,772 patients included in the analytic sample, of which 40.5% had exacerbations during the outcome period. Patients with

  10. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Altered Structural and Functional Connectivity of Juvenile Myoclonic Epilepsy: An fMRI Study

    Directory of Open Access Journals (Sweden)

    Chengqing Zhong

    2018-01-01

    Full Text Available The aim of this study was to investigate the structural and functional connectivity (FC of juvenile myoclonic epilepsy (JME using resting state functional magnetic resonance imaging (rs-fMRI. High-resolution T1-weighted magnetic resonance imaging (MRI and rs-fMRI data were collected in 25 patients with JME and in 24 control subjects. A FC analysis was subsequently performed, with seeding at the regions that demonstrated between-group differences in gray matter volume (GMV. Then, the observed structural and FCs were associated with the clinical manifestations. The decreased GMV regions were found in the bilateral anterior cerebellum, the right orbital superior frontal gyrus, the left middle temporal gyrus, the left putamen, the right hippocampus, the bilateral caudate, and the right thalamus. The changed FCs were mainly observed in the motor-related areas and the cognitive-related areas. The significant findings of this study revealed an important role for the cerebellum in motor control and cognitive regulation in JME patients, which also have an effect on the activity of the occipital lobe. In addition, the changed FCs were related to the clinical features of JME patients. The current observations may contribute to the understanding of the pathogenesis of JME.

  12. Quintupling Inhaled Glucocorticoids to Prevent Childhood Asthma Exacerbations.

    Science.gov (United States)

    Jackson, Daniel J; Bacharier, Leonard B; Mauger, David T; Boehmer, Susan; Beigelman, Avraham; Chmiel, James F; Fitzpatrick, Anne M; Gaffin, Jonathan M; Morgan, Wayne J; Peters, Stephen P; Phipatanakul, Wanda; Sheehan, William J; Cabana, Michael D; Holguin, Fernando; Martinez, Fernando D; Pongracic, Jacqueline A; Baxi, Sachin N; Benson, Mindy; Blake, Kathryn; Covar, Ronina; Gentile, Deborah A; Israel, Elliot; Krishnan, Jerry A; Kumar, Harsha V; Lang, Jason E; Lazarus, Stephen C; Lima, John J; Long, Dayna; Ly, Ngoc; Marbin, Jyothi; Moy, James N; Myers, Ross E; Olin, J Tod; Raissy, Hengameh H; Robison, Rachel G; Ross, Kristie; Sorkness, Christine A; Lemanske, Robert F

    2018-03-08

    Asthma exacerbations occur frequently despite the regular use of asthma-controller therapies, such as inhaled glucocorticoids. Clinicians commonly increase the doses of inhaled glucocorticoids at early signs of loss of asthma control. However, data on the safety and efficacy of this strategy in children are limited. We studied 254 children, 5 to 11 years of age, who had mild-to-moderate persistent asthma and had had at least one asthma exacerbation treated with systemic glucocorticoids in the previous year. Children were treated for 48 weeks with maintenance low-dose inhaled glucocorticoids (fluticasone propionate at a dose of 44 μg per inhalation, two inhalations twice daily) and were randomly assigned to either continue the same dose (low-dose group) or use a quintupled dose (high-dose group; fluticasone at a dose of 220 μg per inhalation, two inhalations twice daily) for 7 days at the early signs of loss of asthma control ("yellow zone"). Treatment was provided in a double-blind fashion. The primary outcome was the rate of severe asthma exacerbations treated with systemic glucocorticoids. The rate of severe asthma exacerbations treated with systemic glucocorticoids did not differ significantly between groups (0.48 exacerbations per year in the high-dose group and 0.37 exacerbations per year in the low-dose group; relative rate, 1.3; 95% confidence interval, 0.8 to 2.1; P=0.30). The time to the first exacerbation, the rate of treatment failure, symptom scores, and albuterol use during yellow-zone episodes did not differ significantly between groups. The total glucocorticoid exposure was 16% higher in the high-dose group than in the low-dose group. The difference in linear growth between the high-dose group and the low-dose group was -0.23 cm per year (P=0.06). In children with mild-to-moderate persistent asthma treated with daily inhaled glucocorticoids, quintupling the dose at the early signs of loss of asthma control did not reduce the rate of severe asthma

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  15. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  16. Quadrupling Inhaled Glucocorticoid Dose to Abort Asthma Exacerbations.

    Science.gov (United States)

    McKeever, Tricia; Mortimer, Kevin; Wilson, Andrew; Walker, Samantha; Brightling, Christopher; Skeggs, Andrew; Pavord, Ian; Price, David; Duley, Lelia; Thomas, Mike; Bradshaw, Lucy; Higgins, Bernard; Haydock, Rebecca; Mitchell, Eleanor; Devereux, Graham; Harrison, Timothy

    2018-03-08

    Asthma exacerbations are frightening for patients and are occasionally fatal. We tested the concept that a plan for patients to manage their asthma (self-management plan), which included a temporary quadrupling of the dose of inhaled glucocorticoids when asthma control started to deteriorate, would reduce the incidence of severe asthma exacerbations among adults and adolescents with asthma. We conducted a pragmatic, unblinded, randomized trial involving adults and adolescents with asthma who were receiving inhaled glucocorticoids, with or without add-on therapy, and who had had at least one exacerbation in the previous 12 months. We compared a self-management plan that included an increase in the dose of inhaled glucocorticoids by a factor of 4 (quadrupling group) with the same plan without such an increase (non-quadrupling group), over a period of 12 months. The primary outcome was the time to a first severe asthma exacerbation, defined as treatment with systemic glucocorticoids or an unscheduled health care consultation for asthma. A total of 1922 participants underwent randomization, of whom 1871 were included in the primary analysis. The number of participants who had a severe asthma exacerbation in the year after randomization was 420 (45%) in the quadrupling group as compared with 484 (52%) in the non-quadrupling group, with an adjusted hazard ratio for the time to a first severe exacerbation of 0.81 (95% confidence interval, 0.71 to 0.92; P=0.002). The rate of adverse effects, which were related primarily to local effects of inhaled glucocorticoids, was higher in the quadrupling group than in the non-quadrupling group. In this trial involving adults and adolescents with asthma, a personalized self-management plan that included a temporary quadrupling of the dose of inhaled glucocorticoids when asthma control started to deteriorate resulted in fewer severe asthma exacerbations than a plan in which the dose was not increased. (Funded by the Health Technology

  17. Incidence and outcomes of patients hospitalized with COPD exacerbation with and without pneumonia

    Directory of Open Access Journals (Sweden)

    Søgaard M

    2016-03-01

    Full Text Available Mette Søgaard,1 Morten Madsen,1 Anders Løkke,2 Ole Hilberg,2 Henrik Toft Sørensen,1 Reimar W Thomsen1 1Department of Clinical Epidemiology, 2Department of Respiratory Medicine, Aarhus University Hospital, Aarhus C, Denmark Background: Pneumonia may be a major contributor to hospitalizations for chronic obstructive pulmonary disease (COPD exacerbation and influence their outcomes.Methods: We examined hospitalization rates, health resource utilization, 30-day mortality, and risk of subsequent hospitalizations for COPD exacerbations with and without pneumonia in Denmark during 2006–2012.Results: We identified 179,759 hospitalizations for COPD exacerbations, including 52,520 first-time hospitalizations (29.2%. Pneumonia was frequent in first-time exacerbations (36.1%, but declined in successive exacerbations to 25.6% by the seventh or greater exacerbation. Pneumonic COPD exacerbations increased 20% from 0.92 per 1,000 population in 2006 to 1.10 per 1,000 population in 2012. Nonpneumonic exacerbations decreased by 6% from 1.74 per 1,000 population to 1.63 per 1,000 population during the same period. A number of markers of health resource utilization were more prevalent in pneumonic exacerbations than in nonpneumonic exacerbations: length of stay (median 7 vs 4 days, intensive care unit admission (7.7% vs 12.5%, and several acute procedures. Thirty-day mortality was 12.1% in first-time pneumonic COPD exacerbations versus 8.3% in first-time nonpneumonic cases (adjusted HR [aHR] 1.20, 95% confidence interval [CI] 1.17–1.24. Pneumonia also predicted increased mortality associated with a second exacerbation (aHR 1.14, 95% CI 1.11–1.18, and up to a seventh or greater exacerbation (aHR 1.10, 95% CI 1.07–1.13. In contrast, the aHR of a subsequent exacerbation was 8%–13% lower for patients with pneumonic exacerbations.Conclusions: Pneumonia is frequent among patients hospitalized for COPD exacerbations and is associated with increased health care

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. Stability of the frequent COPD exacerbator in the general population

    DEFF Research Database (Denmark)

    Reilev, Mette; Lykkegaard, Jesper; Halling, Anders

    2017-01-01

    Exacerbation frequency is central in treatment strategies for chronic obstructive pulmonary disease. However, whether chronic obstructive pulmonary disease patients from the general population with frequent exacerbations continue to have frequent exacerbations over an extended period of time is c...... considerably over time. This could hold implications for COPD treatment and challenge assumptions made about disease progression....... is currently unknown. In this study, we aimed to investigate the stability of the frequent exacerbator in a population-based setting. To this end, we conducted a nationwide register-based descriptive study with a 10-year follow-up period of chronic obstructive pulmonary disease patients with at least one...... obstructive pulmonary disease treatment guidelines and their practical application. CHRONIC OBSTRUCTIVE LUNG DISEASE: VARIATIONS IN DISEASE PROGRESSION: Patients with chronic obstructive pulmonary disease (COPD) who suffer from frequent exacerbations do not necessarily persist with such severity over time...

  20. Prevalence of Asthma, Asthma Attacks, and Emergency Department Visits for Asthma Among Working Adults - National Health Interview Survey, 2011-2016.

    Science.gov (United States)

    Mazurek, Jacek M; Syamlal, Girija

    2018-04-06

    In 2010, an estimated 8.2% of U.S. adults had current asthma, and among these persons, 49.1% had had an asthma attack during the past year (1). Workplace exposures can cause asthma in a previously healthy worker or can trigger asthma exacerbations in workers with current asthma* (2). To assess the industry- and occupation-specific prevalence of current asthma, asthma attacks, and asthma-related emergency department (ED) visits among working adults, CDC analyzed 2011-2016 National Health Interview Survey (NHIS) data for participants aged ≥18 years who, at the time of the survey, were employed at some time during the 12 months preceding the interview. During 2011-2016, 6.8% of adults (11 million) employed at any time in the past 12 months had current asthma; among those, 44.7% experienced an asthma attack, and 9.9% had an asthma-related ED visit in the previous year. Current asthma prevalence was highest among workers in the health care and social assistance industry (8.8%) and in health care support occupations (8.8%). The increased prevalence of current asthma, asthma attacks, and asthma-related ED visits in certain industries and occupations might indicate increased risks for these health outcomes associated with workplace exposures. These findings might assist health care and public health professionals in identifying workers in industries and occupations with a high prevalence of current asthma, asthma attacks, and asthma-related ED visits who should be evaluated for possible work-related asthma. Guidelines intended to promote effective management of work-related asthma are available (2,3).

  1. Relationship between airway colonization, inflammation and exacerbation frequency in COPD.

    Science.gov (United States)

    Tumkaya, Munir; Atis, Sibel; Ozge, Cengiz; Delialioglu, Nuran; Polat, Gurbuz; Kanik, Arzu

    2007-04-01

    To evaluate bacterial colonization and the airway inflammatory response, and its relationship to the frequency of exacerbation in patients with stable chronic obstructive pulmonary disease (COPD). Quantitative bacteriologic cultures, neutrophil elastase, myeloperoxidase (MPO), tumor necrosis factor alpha (TNF-alpha) and interleukin (IL)-8 were measured in bronchoalveoler lavage (BAL) in 39 patients with stable COPD [19 with frequent exacerbation (> or = 3/year), and 20 with infrequent] and in 18 healthy controls (10 smokers and 8 non-smokers). BAL revealed the microorganisms with potential pathogenicity above the established threshold (> or = 10(3)cfu/ml) in 68.4% of patients with frequent exacerbation, 55% of infrequent exacerbation, 40% of smokers and 12.5% of non-smokers controls (P=0.05). BAL MPO, IL-8 and TNF-alpha levels were found to be significantly higher in COPD as compared to controls (P=0.001). However, only IL-8 level was significantly higher in COPD patients with frequent exacerbation as compared to infrequent (P=0.001). Airway bacterial load correlated with levels of airway inflammation markers in COPD (P<0.05). The bacterial load and airway inflammation contributes to each other in stable COPD. However, there is a link only between interleukine (IL)-8 and frequent exacerbations. Clearly, the relationship between bacterial colonization, airway inflammation and frequent exacerbations is of major importance in understanding of the COPD pathogenesis.

  2. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  3. Pulmonary artery enlargement and cystic fibrosis pulmonary exacerbations: a cohort study

    Science.gov (United States)

    Wells, J. Michael; Farris, Roopan F.; Gosdin, Taylor A.; Dransfield, Mark T.; Wood, Michelle E.; Bell, Scott C.; Rowe, Steven M.

    2017-01-01

    Background Acute pulmonary exacerbations are associated with progressive lung function decline and increased mortality in cystic fibrosis (CF). The role of pulmonary vascular disease in pulmonary exacerbations is unknown. We investigated the association between pulmonary artery enlargement (PA:A>1), a marker of pulmonary vascular disease, and exacerbations. Methods We analyzed clinical, computed tomography (CT), and prospective exacerbation data in a derivation cohort of 74 adult CF patients, measuring the PA:A at the level of the PA bifurcation. We then replicated our findings in a validation cohort of 190 adult CF patients. Patients were separated into groups based on the presence or absence of a PA:A>1 and were followed for 1-year in the derivation cohort and 2-years in the validation cohort. The primary endpoint was developing ≥1 acute pulmonary exacerbation during follow-up. Linear and logistic regression models were used to determine associations between clinical factors, the PA:A ratio, and pulmonary exacerbations. We used Cox regression to determine time to first exacerbation in the validation cohort. Findings We found that PA:A>1 was present in n=37/74 (50%) of the derivation and n=89/190 (47%) of the validation cohort. In the derivation cohort, n=50/74 (68%) had ≥1 exacerbation at 1 year and n=133/190 (70%) in the validation cohort had ≥1 exacerbation after 2 years. PA:A>1 was associated with younger age in both cohorts and with elevated sweat chloride (100.5±10.9 versus 90.4±19.9mmol/L, difference between groups 10.1mmol/L [95%CI 2.5–17.7], P=0.017) in the derivation group. PA:A>1 was associated with exacerbations in the derivation (OR 3.49, 95%CI 1.18–10.3, P=0.023) and validation (OR 2.41, 95%CI 1.06–5.52, P=0.037) cohorts when adjusted for confounders. Time to first exacerbation was shorter in PA:A>1 versus PA:Apulmonary exacerbation risk in two well-characterized cohorts. PA:A may be a predictive marker in CF. PMID:27298019

  4. Patterns and characterization of COPD exacerbations using real-time data collection

    Directory of Open Access Journals (Sweden)

    Ejiofor SI

    2017-01-01

    Full Text Available Stanley I Ejiofor,1,2 Jan Stolk,3 Pablo Fernandez,4 Robert A Stockley1,2 1Centre for Translational Inflammation Research, University of Birmingham, 2ADAPT Project, University Hospital Birmingham, Birmingham, UK; 3Leiden University Medical Centre, Leiden, the Netherlands; 4Independent consultant, Penn, UK Introduction: Patients with chronic obstructive pulmonary disease often experience exacerbations. These events are important as they are a major cause of morbidity and mortality. Recently, it has been increasingly recognized that patients may experience symptoms suggestive of an exacerbation but do not seek treatment, which are referred to as unreported or untreated exacerbations. Symptom diaries used in clinical trials have the benefit of identifying both treated and untreated exacerbation events. Methods: The Kamada study was a multicenter, double-blind randomized controlled trial of inhaled augmentation therapy in alpha-1 antitrypsin deficiency (AATD. A retrospective review of daily electronic symptom diary cards was undertaken from the two leading centers to identify symptomatic episodes consistent with a definition of an exacerbation. The aims were to explore the relationship between exacerbation events and classical “Anthonisen” symptoms and to characterize treated and untreated episodes. Results: Forty-six AATD patients with airflow obstruction and history of exacerbations were included in the analysis. Two hundred thirty-three exacerbation episodes were identified: 103 untreated and 130 treated. Untreated episodes were significantly shorter (median 6 days; interquartile range [IQR] 3–10 days than the treated episodes (median 10 days; IQR 5–18.25 days: P<0.001. Using logistic regression analysis, Anthonisen type and length of dyspnea were significant predictors of the treatment of an exacerbation event. Conclusion: Real-time electronic diary cards provide valuable information about the characterization of exacerbations

  5. Factors influencing exacerbation-related self-management in patients with COPD: a qualitative study.

    Science.gov (United States)

    Korpershoek, Yjg; Vervoort, Scjm; Nijssen, Lit; Trappenburg, Jca; Schuurmans, M J

    2016-01-01

    In patients with COPD, self-management skills are important to reduce the impact of exacerbations. However, both detection and adequate response to exacerbations appear to be difficult for some patients. Little is known about the underlying process of exacerbation-related self-management. Therefore, the objective of this study was to identify and explain the underlying process of exacerbation-related self-management behavior. A qualitative study using semi-structured in-depth interviews was performed according to the grounded theory approach, following a cyclic process in which data collection and data analysis alternated. Fifteen patients (male n=8; age range 59-88 years) with mild to very severe COPD were recruited from primary and secondary care settings in the Netherlands, in 2015. Several patterns in exacerbation-related self-management behavior were identified, and a conceptual model describing factors influencing exacerbation-related self-management was developed. Acceptance, knowledge, experiences with exacerbations, perceived severity of symptoms and social support were important factors influencing exacerbation-related self-management. Specific factors influencing recognition of exacerbations were heterogeneity of exacerbations and habituation to symptoms. Feelings of fear, perceived influence on exacerbation course, patient beliefs, ambivalence toward treatment, trust in health care providers and self-empowerment were identified as specific factors influencing self-management actions. This study provided insight into factors influencing exacerbation-related self-management behavior in COPD patients. The conceptual model can be used as a framework for health care professionals providing self-management support. In the development of future self-management interventions, factors influencing the process of exacerbation-related self-management should be taken into account.

  6. Prognosis of juvenile myoclonic epilepsy is related to endophenotypes.

    Science.gov (United States)

    Guaranha, Mirian S B; Filho, Gerardo M de Araújo; Lin, Kátia; Guilhoto, Laura M F F; Caboclo, Luis Otávio S F; Yacubian, Elza Márcia T

    2011-01-01

    To investigate if phenotypic variations have prognostic implications in juvenile myoclonic epilepsy (JME). Sixty-five consecutive JME patients had video-EEG recording and were followed for at least three years. Reflex traits were defined as seizures and/or EEG discharges induction by eye-closure, photic stimulation, language, praxis or calculation. Patients had psychiatric evaluation and answered to STAI (State-Trait Anxiety Inventory). Seizure control was classified according to Prasad et al. (2003).(24) Patients were divided into Group 1: good seizure control and Group 2: moderate or poor seizure control. Video-EEG/EEG evaluation was repeated in 21 patients. Forty of 65 (61.5%) patients reached good seizure control, 25 (38.5%) of whom became seizure free. Group 2 patients had longer epilepsy duration (13.9±9.0 vs. 8.7±8.2; p=0.019); higher prevalence of the combination of all three seizure types (72.0% vs. 30.0%; p=0.003); discharges in baseline EEG (56.0% vs. 22.5%; p=0.008); seizure recording (68% vs. 20%; p<0.001) and sensitivity to praxis (63.6% vs. 29.6%; p=0.023). Compared to seizure-free patients, those with persistent seizures presented younger age at epilepsy onset (12.6±3.33 years vs. 15.4±5.47 years; p=0.015); higher prevalence of personality disorders (25% vs. 4%; p=0.029); higher scores in STAI-T (45.9±11.31 vs. 36.6±11.43; p=0.011) and higher incidence of sensitivity to praxis (58.6% vs. 25.0%; p=0.04) and to language (53.8 vs. 16.7%; p=0.026) tasks. Repetition of EEG/video-EEG revealed a parallel evolution of reflex traits disappearance and seizure control. Clinical features and reflex traits have prognosis implications in JME. Copyright © 2010 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  7. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  8. Predicting an asthma exacerbation in children 2 to 5 years of age

    DEFF Research Database (Denmark)

    Swern, A.S.; Tozzi, C.A.; Knorr, B.

    2008-01-01

    BACKGROUND: Asthma exacerbations in young children are prevalent. Identification of symptoms or other factors that are precursors of asthma exacerbations would be useful for early treatment and prevention. OBJECTIVES: To determine whether diary symptoms and beta2-agonist use before an exacerbation...... could predict an asthma exacerbation in children 2 to 5 years of age. METHODS: Post hoc analyses were conducted on data collected in a study of 689 patients 2 to 5 years of age with asthma symptoms, randomly assigned to montelukast, 4 mg, or placebo daily for 12 weeks. During the study, 196 patients had...... of an exacerbation. These methods predicted 149 (66.8%) of the exacerbations with a very low false-positive rate of 14.2%. CONCLUSIONS: No individual symptom was predictive of an imminent asthma exacerbation, but a combination of increased daytime cough, daytime wheeze, and nighttime beta2-agonist use 1 day before...

  9. Dark chocolate exacerbates acne.

    Science.gov (United States)

    Vongraviopap, Saivaree; Asawanonda, Pravit

    2016-05-01

    The effects of chocolate on acne exacerbations have recently been reevaluated. For so many years, it was thought that it had no role in worsening acne. To investigate whether 99% dark chocolate, when consumed in regular daily amounts, would cause acne to worsen in acne-prone male subjects, twenty-five acne prone male subjects were asked to consume 25 g of 99% dark chocolate daily for 4 weeks. Assessments which included Leeds revised acne scores as well as lesion counts took place weekly. Food frequency questionnaire was used, and daily activities were recorded. Statistically significant changes of acne scores and numbers of comedones and inflammatory papules were detected as early as 2 weeks into the study. At 4 weeks, the changes remained statistically significant compared to baseline. Dark chocolate when consumed in normal amounts for 4 weeks can exacerbate acne in male subjects with acne-prone skin. © 2015 The International Society of Dermatology.

  10. Inflammatory biomarkers and exacerbations in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Thomsen, Mette; Ingebrigtsen, Truls Sylvan; Marott, Jacob Louis

    2013-01-01

    Exacerbations of respiratory symptoms in chronic obstructive pulmonary disease (COPD) have profound and long-lasting adverse effects on patients.......Exacerbations of respiratory symptoms in chronic obstructive pulmonary disease (COPD) have profound and long-lasting adverse effects on patients....

  11. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  12. Structural Brain Abnormalities in Juvenile Myoclonic Epilepsy Patients: Volumetry and Voxel-Based Morphometry

    International Nuclear Information System (INIS)

    Tae, Woo Suk; Hong, Seung Bong; Joo, Eun Yun

    2006-01-01

    We aimed to find structural brain abnormalities in juvenile myoclonic epilepsy (JME) patients. The volumes of the cerebrum, hippocampus and frontal lobe and the area of the corpus callosum's subdivisions were all semiautomatically measured, and then optimized voxel-based morphometry (VBM) was performed in 19 JME patients and 19 age/gender matched normal controls. The rostrum and rostral body of the corpus callosum and the left hippocampus were significantly smaller than those of the normal controls, whereas the volume of the JME's left frontal lobe was significantly larger than that of the controls. The area of the rostral body had a significant positive correlation with the age of seizure onset (r=0.56, p=0.012), and the volume of the right frontal lobe had a significant negative correlation with the duration of disease (r=-0.51, p=0.025). On the VBM, the gray matter concentration of the prefrontal lobe (bilateral gyri rectus, anterior orbital gyri, left anterior middle frontal gyrus and right anterior superior frontal gyrus) was decreased in the JME group (corrected p<0.05). The JME patients showed complex structural abnormalities in the corpus callosum, frontal lobe and hippocampus, and also a decreased gray matter concentration of the prefrontal region, which all suggests there is an abnormal neural network in the JME brain

  13. Structural Brain Abnormalities in Juvenile Myoclonic Epilepsy Patients: Volumetry and Voxel-Based Morphometry

    Energy Technology Data Exchange (ETDEWEB)

    Tae, Woo Suk; Hong, Seung Bong [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of); Joo, Eun Yun [Ewha Womans University, Seoul (Korea, Republic of)

    2006-09-15

    We aimed to find structural brain abnormalities in juvenile myoclonic epilepsy (JME) patients. The volumes of the cerebrum, hippocampus and frontal lobe and the area of the corpus callosum's subdivisions were all semiautomatically measured, and then optimized voxel-based morphometry (VBM) was performed in 19 JME patients and 19 age/gender matched normal controls. The rostrum and rostral body of the corpus callosum and the left hippocampus were significantly smaller than those of the normal controls, whereas the volume of the JME's left frontal lobe was significantly larger than that of the controls. The area of the rostral body had a significant positive correlation with the age of seizure onset (r=0.56, p=0.012), and the volume of the right frontal lobe had a significant negative correlation with the duration of disease (r=-0.51, p=0.025). On the VBM, the gray matter concentration of the prefrontal lobe (bilateral gyri rectus, anterior orbital gyri, left anterior middle frontal gyrus and right anterior superior frontal gyrus) was decreased in the JME group (corrected p<0.05). The JME patients showed complex structural abnormalities in the corpus callosum, frontal lobe and hippocampus, and also a decreased gray matter concentration of the prefrontal region, which all suggests there is an abnormal neural network in the JME brain.

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  17. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  19. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  20. Factors associated with change in exacerbation frequency in COPD

    DEFF Research Database (Denmark)

    Donaldson, Gavin C; Müllerova, Hanna; Locantore, Nicholas

    2013-01-01

    Patients with chronic obstructive pulmonary disease (COPD) can be categorized as having frequent (FE) or infrequent (IE) exacerbations depending on whether they respectively experience two or more, or one or zero exacerbations per year. Although most patients do not change category from year to y...

  1. Medically treated exacerbations in COPD by GOLD 1-4

    DEFF Research Database (Denmark)

    Sylvan Ingebrigtsen, Truls; Marott, Jacob L; Lange, Peter

    2015-01-01

    AIM: We hypothesized that medically treated exacerbations in COPD defined as treatments with oral corticosteroids alone or in combination with antibiotics by register linkage with a nationwide prescription registry is a valid, robust and low-biased measure of exacerbations. METHODS: A total of 13...

  2. The Burden of Illness Related to Chronic Obstructive Pulmonary Disease Exacerbations in Québec, Canada

    Directory of Open Access Journals (Sweden)

    Tam Dang-Tan

    2017-01-01

    Full Text Available Background. Chronic obstructive pulmonary disease (COPD prevalence in Canada has risen over time. COPD-related exacerbations contribute to the increased health care utilization (HCU in this population. This study investigated the impact of exacerbations on COPD-related HCU. Methods. This retrospective observational cohort study used patient data from the Québec provincial health insurance databases. Eligible patients with a new HCU claim with a diagnostic billing for COPD during 2001–2010 were followed until March 31, 2011. Exacerbation rates and time to first exacerbation were assessed. Unadjusted analyses and multivariable models compared the rate of HCU by exacerbation classification (any [moderate/severe], moderate, or severe. Results. The exacerbation event rate in patients with an exacerbation was 34.3 events/100 patient-years (22.7 for moderate exacerbations and 11.6 for severe exacerbations. Median time to first exacerbation of any classification was 37 months. In unadjusted analyses, COPD-related HCU significantly increased with exacerbation severity. In the multivariable, HCU rates were significantly higher after exacerbation versus before exacerbation (p<0.01 for patients with an exacerbation or moderate exacerbations. For severe exacerbations, general practitioner, respiratory specialist, emergency room, and hospital visits were significantly higher after exacerbation versus before exacerbation (p<0.001. Conclusions. Exacerbations were associated with increased HCU, which was more pronounced for patients with severe exacerbations. Interventions to reduce the risk of exacerbations in patients with COPD may reduce disease burden.

  3. COPD exacerbation: anthropometric characteristics of patients and the frequency of hospital admissions

    Directory of Open Access Journals (Sweden)

    Gashynova K.Y.

    2014-11-01

    Full Text Available Exceptional importance of exacerbations for COPD course prognosing was reflected in the GOLD, 2011, where the number of exacerbations during the past year has been recognized as one of the main criteria of the future risks for patients. The aim of study was to determine the anthropometric indicators that increase the risk of re-hospitalization due to acute exacerbation of COPD. A retrospective analysis of medical records of inpatients who were hospitalized with COPD exacerbation to therapeutic department of CI "Dnipropetrovs’k sixth municipal clinical hospital" of Dnipropetrovsk regional council" during three years was done. It was established that neither sex, nor height, nor weight affect the rate of hospitalization due to COPD exacerbations. Older age is not a factor that increases the risk of hospitalization due to COPD exacerbation (despite the fact that the majority of hospitalized patients were elderly patients, 37% of them were persons of potentially working age. Severe exacerbation of COPD may occur in any patients with, even one year, experience of the disease. Among anthropometric indices, the most important predictor of re-hospitalization due to exacerbation of COPD is BMI<18.5, so its calculation is advisable in long-term observation of patients.

  4. Pharmacogenetic Aspects of Airways’ Obstruction Relief Therapy of Bronchial Asthma Attacks in Schoolchildren

    Directory of Open Access Journals (Sweden)

    L.V. Mikaluk

    2013-03-01

    Full Text Available On the base of a complex examination of 215 schoolchildren who suffer bronchial asthma, there have been established that clinical manifestations of severity of bronchial obstructive syndrome during disease exacerbation do not depend on acetylating status. However, a homozygosity on both alleles of the glutathione transferase gene (GSTT1+M1+ has been connected to greater severity of asthma attacks, while a lack of the T-allele in children with slow acetylating phenotype has been associated with more frequent use of systemic corticosteroids and somewhat better results of airways obstruction relief therapy. Occurrence of GSTT1+M1+ genotype in patients with accelerated processes of acetylation significantly increased the risk of the inefficiency of bronchial obstruction relief therapy (odds ratio 12.4, relative risk — 6.4, the absolute risk — 50 %.

  5. Rationale and design of a randomized trial of home electronic symptom and lung function monitoring to detect cystic fibrosis pulmonary exacerbations: the early intervention in cystic fibrosis exacerbation (eICE) trial.

    Science.gov (United States)

    Lechtzin, N; West, N; Allgood, S; Wilhelm, E; Khan, U; Mayer-Hamblett, N; Aitken, M L; Ramsey, B W; Boyle, M P; Mogayzel, P J; Goss, C H

    2013-11-01

    Acute pulmonary exacerbations are central events in the lives of individuals with cystic fibrosis (CF). Pulmonary exacerbations lead to impaired lung function, worse quality of life, and shorter survival. We hypothesized that aggressive early treatment of acute pulmonary exacerbation may improve clinical outcomes. Describe the rationale of an ongoing trial designed to determine the efficacy of home monitoring of both lung function measurements and symptoms for early detection and subsequent early treatment of acute CF pulmonary exacerbations. A randomized, non-blinded, multi-center trial in 320 individuals with CF aged 14 years and older. The study compares usual care to a twice a week assessment of home spirometry and CF respiratory symptoms using an electronic device with data transmission to the research personnel to identify and trigger early treatment of CF pulmonary exacerbation. Participants will be enrolled in the study for 12 months. The primary endpoint is change in FEV1 (L) from baseline to 12 months determined by a linear mixed effects model incorporating all quarterly FEV1 measurements. Secondary endpoints include time to first acute protocol-defined pulmonary exacerbation, number of acute pulmonary exacerbations, number of hospitalization days for acute pulmonary exacerbation, time from the end of acute pulmonary exacerbation to onset of subsequent pulmonary exacerbation, change in health related quality of life, change in treatment burden, change in CF respiratory symptoms, and adherence to the study protocol. This study is a first step in establishing alternative approaches to the care of CF pulmonary exacerbations. We hypothesize that early treatment of pulmonary exacerbations has the potential to slow lung function decline, reduce respiratory symptoms and improve the quality of life for individuals with CF. © 2013.

  6. Glucose tolerance during pulmonary exacerbations in children with cystic fibrosis.

    Directory of Open Access Journals (Sweden)

    John Widger

    Full Text Available BACKGROUND: Patients with Cystic Fibrosis (CF are relatively insulinopenic and are at risk of diabetes, especially during times of stress. There is a paucity of data in the literature describing glucose tolerance during CF pulmonary exacerbations. We hypothesised that glucose tolerance would be worse during pulmonary exacerbations in children with CF than during clinical stability. METHODS: Patients with CF, 10 years or older, admitted with a pulmonary exacerbation underwent an OGTT within 48 hours of admission. A repeat OGTT was performed 4 to 6 weeks post discharge when the patients were well. RESULTS: Nine patients completed the study. Four patients were found to have normal glucose tolerance, 3 with impaired and 2 with CF related diabetes during the exacerbation. Mean change in 2-hour glucose was 1.1 mmol (SD = 0.77. At the follow up OGTT, 8 of 9 (89% remained within their respective glucose tolerance status groupings. CONCLUSION: The findings of this study show that there is little difference in glucose tolerance during CF exacerbations compared to clinical stability in the majority of patients.

  7. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  8. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  9. Antibody deficiency in patients with frequent exacerbations of Chronic Obstructive Pulmonary Disease (COPD).

    Science.gov (United States)

    McCullagh, Brian N; Comellas, Alejandro P; Ballas, Zuhair K; Newell, John D; Zimmerman, M Bridget; Azar, Antoine E

    2017-01-01

    Chronic Obstructive Pulmonary Disease is the third leading cause of death in the US, and is associated with periodic exacerbations, which account for the largest proportion of health care utilization, and lead to significant morbidity, mortality, and worsening lung function. A subset of patients with COPD have frequent exacerbations, occurring 2 or more times per year. Despite many interventions to reduce COPD exacerbations, there is a significant lack of knowledge in regards to their mechanisms and predisposing factors. We describe here an important observation that defines antibody deficiency as a potential risk factor for frequent COPD exacerbations. We report a case series of patients who have frequent COPD exacerbations, and who were found to have an underlying primary antibody deficiency syndrome. We also report on the outcome of COPD exacerbations following treatment in a subset with of these patients with antibody deficiency. We identified patients with COPD who had 2 or more moderate to severe exacerbations per year; immune evaluation including serum immunoglobulin levels and pneumococcal IgG titers was performed. Patients diagnosed with an antibody deficiency syndrome were treated with either immunoglobulin replacement therapy or prophylactic antibiotics, and their COPD exacerbations were monitored over time. A total of 42 patients were identified who had 2 or more moderate to severe COPD exacerbations per year. Twenty-nine patients had an underlying antibody deficiency syndrome: common variable immunodeficiency (8), specific antibody deficiency (20), and selective IgA deficiency (1). Twenty-two patients had a follow-up for at least 1 year after treatment of their antibody deficiency, which resulted in a significant reduction of COPD exacerbations, courses of oral corticosteroid use and cumulative annual dose of oral corticosteroid use, rescue antibiotic use, and hospitalizations for COPD exacerbations. This case series identifies antibody deficiency as a

  10. Inflammatory Responses, Spirometry, and Quality of Life in Subjects With Bronchiectasis Exacerbations.

    Science.gov (United States)

    Guan, Wei-Jie; Gao, Yong-Hua; Xu, Gang; Lin, Zhi-Ya; Tang, Yan; Li, Hui-Min; Lin, Zhi-Min; Jiang, Mei; Zheng, Jin-Ping; Chen, Rong-Chang; Zhong, Nan-Shan

    2015-08-01

    Bronchiectasis exacerbations are critical events characterized by worsened symptoms and signs (ie, cough frequency, sputum volume, malaise). Our goal was to examine variations in airway and systemic inflammation, spirometry, and quality of life during steady state, bronchiectasis exacerbations, and convalescence (1 week following a 2-week antibiotic treatment) to determine whether potentially pathogenic microorganisms, including Pseudomonas aeruginosa, were associated with poorer conditions during bronchiectasis exacerbations. Peripheral blood and sputum were sampled to detect inflammatory mediators and bacterial densities. Spirometry and quality of life (St George Respiratory Questionnaire [SGRQ]) were assessed during the 3 stages. Forty-eight subjects with bronchiectasis (43.2 ± 14.2 y of age) were analyzed. No notable differences in species and density of potentially pathogenic microorganisms were found during bronchiectasis exacerbations. Except for CXCL8 and tumor necrosis factor alpha (TNF-α), serum inflammation was heightened during bronchiectasis exacerbations and recovered during convalescence. Even though sputum TNF-α was markedly higher during bronchiectasis exacerbations and remained heightened during convalescence, the variations in miscellaneous sputum markers were unremarkable. Bronchiectasis exacerbations were associated with notably higher SGRQ symptom and total scores, which recovered during convalescence. FVC, FEV1, and maximum mid-expiratory flow worsened during bronchiectasis exacerbations (median change from baseline of -2.2%, -0.8%, and -1.3%) and recovered during convalescence (median change from baseline of 0.6%, 0.7%, and -0.7%). Compared with no bacterial isolation, potentially pathogenic microorganism or P. aeruginosa isolation at baseline did not result in poorer clinical condition during bronchiectasis exacerbations. Bronchiectasis exacerbations are characterized by heightened inflammatory responses and poorer quality of life and

  11. The reliability and validity of patient-reported chronic obstructive pulmonary disease exacerbations.

    Science.gov (United States)

    Mohan, Arjun; Sethi, Sanjay

    2014-03-01

    Despite the increasing awareness of their pathogenesis and clinical consequences, research on and clinical management of acute exacerbations of chronic obstructive lung disease (AECOPDs) have been hindered by the lack of a consistent and reliable definition. Symptom-based definitions of exacerbations are sensitive to events and account for unreported exacerbations. Event (healthcare utilization)-based definitions are somewhat more definitive but miss unreported events. Objective quantification of symptoms in AECOPD is now possible with the development of the Exacerbations of Chronic Obstructive Pulmonary Disease Tool (EXACT-PRO), a patient-reported outcome (PRO) measure. Several studies have revealed that unreported AECOPDs are more frequent than reported events and are associated with long-term adverse consequences. New antibiotic development for AECOPD has been hampered by the lack of validated measures for resolution of exacerbations. As a result of these observations, a unique collaborative effort between academia, industry and regulatory agencies resulted in the development of the EXACT-PRO. It consists of 14 questions that generate a score between 0 and 100, and it has been shown to have excellent reliability and validity. In the absence of a reliable biomarker, the definition and measurement of exacerbations has been subjective and imprecise. PRO measures such as EXACT can provide much needed objectivity in assessing symptom-defined exacerbations, which may translate into a uniform outcome measure in clinical trials. With further development and validation, it may have a role in clinical practice in the earlier detection of exacerbations, stratification of an exacerbation severity and the assessment of clinical response to treatment.

  12. Impact and prevention of severe exacerbations of COPD: a review of the evidence

    Science.gov (United States)

    Halpin, David MG; Miravitlles, Marc; Metzdorf, Norbert; Celli, Bartolomé

    2017-01-01

    Severe exacerbations of COPD, ie, those leading to hospitalization, have profound clinical implications for patients and significant economic consequences for society. The prevalence and burden of severe COPD exacerbations remain high, despite recognition of the importance of exacerbation prevention and the availability of new treatment options. Severe COPD exacerbations are associated with high mortality, have negative impact on quality of life, are linked to cardiovascular complications, and are a significant burden on the health-care system. This review identified risk factors that contribute to the development of severe exacerbations, treatment options (bronchodilators, antibiotics, corticosteroids [CSs], oxygen therapy, and ventilator support) to manage severe exacerbations, and strategies to prevent readmission to hospital. Risk factors that are amenable to change have been highlighted. A number of bronchodilators have demonstrated successful reduction in risk of severe exacerbations, including long-acting muscarinic antagonist or long-acting β2-agonist mono- or combination therapies, in addition to vaccination, mucolytic and antibiotic therapy, and nonpharmacological interventions, such as pulmonary rehabilitation. Recognition of the importance of severe exacerbations is an essential step in improving outcomes for patients with COPD. Evidence-based approaches to prevent and manage severe exacerbations should be implemented as part of targeted strategies for disease management. PMID:29062228

  13. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  14. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  15. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  16. Statin use and exacerbations in individuals with chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Ingebrigtsen, Truls S; Marott, Jacob L; Nordestgaard, Børge G

    2015-01-01

    BACKGROUND: We tested the hypothesis that statin use in individuals with COPD is associated with a reduced risk of exacerbations. METHODS: We identified 5794 individuals with COPD and a measurement of C reactive protein (CRP) in the Copenhagen General Population Study (2003-2008). During 3 years...... of follow-up we recorded exacerbations with hospital admissions or oral corticosteroid treatment. In a nested case-control design, matching on age, gender, smoking, COPD severity and comorbidity, we estimated the association between statin use and exacerbations. In addition, we examined the association...... between statin use and high CRP (>3 mg/L), and the association between high CRP and exacerbations during follow-up. RESULTS: Statin use was associated with reduced odds of exacerbations in crude analysis, OR=0.68 (95% CI 0.51 to 0.91, p=0.01), as well as in multivariable conditional logistic regression...

  17. [Features of Autonomic Response in Children with Bronchial Asthma in the Period of Exacerbation].

    Science.gov (United States)

    Lebedenko, A A; Semernik, O E

    2015-01-01

    Asthma is one of the urgent problems of modern pediatrics, but neuroregulation mechanisms underlying this disease have not been fully disclosed so far. The autonomic interaction assessment in patients with bronchial asthma is important to understand the pathogenesis and prognosis of the disease. The aim of this study was to investigate features of autonomic response in children with asthma in the period of exacerbation. The autonomic nervous system ANS) of 82 children aged 6 to 18 years old with asthma in the period of exacerbation were investigated. The spectral analysis of the heart rate variability and the correlation rhythmography method (skaterography) were used to assess the ANS state. Investigations were carried out at rest and after clinoorthostatic test. Non-respiratory (slow) waves reflecting (be degree of activity of humoral and neural canals of heart rate central regulation were dominated at the spectrogram of 72 (87.80%) children experiencing asthma attack; more than half of patients (58.53%) had predominantly very low-frequency component (VLF%) in the range of fluctuation rate that indicated (the influence of neurohumoral regulation. A significant increase in vagosympathetic balance coefficient (LE/HF) was recorded after clinoorthostatic test indicating the activation of the sympathetic nervous system. According to the correlation rhytlimnography data, a considerable scattering of scattergraphy points was detected in patients in (the baseline state that indicated the predominant influence of parasympathetic nervous system. After the clinoorthostatic test, on the contrary, we observed the of the scattergraphy cloud that could indicate sympathicotonia. The imbalance of the autonomic nervous system in the form of activation of the sympathetic amid neurohumoral regulation department was found in children with asthma.

  18. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  19. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  20. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  3. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  4. Antibiotics usefulness and choice in BPCO acute exacerbation

    OpenAIRE

    Bruno Tartaglino

    2005-01-01

    Although the debate on the role of bacterial infections and antibiotic treatment in AE-COPD remains open, there is evidence that the persistence of bacteria after acute exacerbation (residual bacterial colony) influences the frequency and severity of subsequent acute exacerbation and that antibiotic treatment that induces faster and more complete eradication produces better clinical outcomes. New aspects must now be considered, given that COPD is a chronic illness subject to acute exacerbatio...

  5. Bringing stability to the COPD patient: clinical and pharmacological considerations for frequent exacerbators

    Science.gov (United States)

    Gulati, Swati

    2017-01-01

    Acute exacerbations of chronic obstructive pulmonary disease (AECOPD) are critical events associated with accelerated loss of lung function, increased morbidity, and excess mortality. AECOPD are heterogeneous in nature and this may directly impact clinical decision making, specifically in patients with frequent exacerbations. A “frequent exacerbator” is a sub-phenotype of COPD that is defined as an individual who experiences ≥2 moderate to severe exacerbations per year. This distinct subgroup has higher mortality and account for more than half of COPD-related hospitalizations annually. Thus, it is imperative to identify individuals at risk for frequent exacerbations and choose optimal strategies to minimize risk for these events. New paradigms for utilizing combination inhalers and the introduction of novel oral compounds provide expanded treatment options to reduce the risk and frequency of exacerbations. The goals of managing frequent exacerbators or patients at risk for AECOPD are: 1) maximizing bronchodilation, 2) reducing inflammation, and 3) targeting specific molecular pathways implicated in COPD and AECOPD pathogenesis. Novel inhaler therapies include combination long acting muscarinic agents (LAMA) plus long acting beta agonists (LABA) show promising results compared to monotherapy or LABA inhaled corticosteroid (ICS) combination in reducing exacerbation risk among individuals at risk for exacerbations and among frequent exacerbators. Likewise, oral medications including macrolides and phosphodiesterase (PDE4) inhibitors reduce the risk for AECOPD in select groups of individuals at high risk for exacerbation. Future direction in COPD management is based on identification of various subtypes or “endotypes” and targeting therapies based on their pathophysiology. This review aims to describe the impact of AECOPD, challenges posed by frequent exacerbators, and explores the rationale for different pharmacologic approaches to preventing AECOPD in these

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. A score to predict short-term risk of COPD exacerbations (SCOPEX

    Directory of Open Access Journals (Sweden)

    Make BJ

    2015-01-01

    Full Text Available Barry J Make,1 Göran Eriksson,2 Peter M Calverley,3 Christine R Jenkins,4 Dirkje S Postma,5 Stefan Peterson,6 Ollie Östlund,7 Antonio Anzueto8 1Division of Pulmonary Sciences and Critical Care Medicine, National Jewish Health, University of Colorado Denver School of Medicine, Denver, CO, USA; 2Department of Respiratory Medicine and Allergology, University Hospital, Lund, Sweden; 3Pulmonary and Rehabilitation Research Group, University Hospital Aintree, Liverpool, UK; 4George Institute for Global Health, The University of Sydney and Concord Clinical School, Woolcock Institute of Medical Research, Sydney, NSW, Australia; 5Department of Pulmonology, University of Groningen and GRIAC Research Institute, University Medical Center Groningen, Groningen, The Netherlands; 6StatMind AB, Lund, Sweden; 7Department of Medical Sciences and Uppsala Clinical Research Center, Uppsala University, Uppsala, Sweden; 8Department of Pulmonary/Critical Care, University of Texas Health Sciences Center and South Texas Veterans Healthcare System, San Antonio, TX, USA Background: There is no clinically useful score to predict chronic obstructive pulmonary disease (COPD exacerbations. We aimed to derive this by analyzing data from three existing COPD clinical trials of budesonide/formoterol, formoterol, or placebo in patients with moderate-to-very-severe COPD and a history of exacerbations in the previous year. Methods: Predictive variables were selected using Cox regression for time to first severe COPD exacerbation. We determined absolute risk estimates for an exacerbation by identifying variables in a binomial model, adjusting for observation time, study, and treatment. The model was further reduced to clinically useful variables and the final regression coefficients scaled to obtain risk scores of 0–100 to predict an exacerbation within 6 months. Receiver operating characteristic (ROC curves and the corresponding C-index were used to investigate the discriminatory

  8. Treatment of exacerbations as a predictor of subsequent outcomes in patients with COPD

    Directory of Open Access Journals (Sweden)

    Calverley PMA

    2018-04-01

    Full Text Available Peter MA Calverley,1 Antonio R Anzueto,2 Daniel Dusser,3 Achim Mueller,4 Norbert Metzdorf,5 Robert A Wise6 1Clinical Science Centre, Institute of Ageing and Chronic Disease, University of Liverpool, Liverpool, UK; 2Pulmonary/Critical Care, University of Texas and South Texas Veterans Health Care System, San Antonio, TX, USA; 3Department of Pneumology, Hôpital Cochin, AP-HP, Université Paris Descartes, Sorbonne Paris Cité, Paris, France; 4Biostatistics and Data Sciences Europe, Boehringer Ingelheim Pharma GmbH & Co. KG, Biberach an der Riss, Germany; 5Respiratory Medicine, Boehringer Ingelheim Pharma GmbH & Co. KG, Ingelheim am Rhein, Germany; 6Division of Pulmonary and Critical Care Medicine, Department of Medicine, Johns Hopkins University School of Medicine, Baltimore, MD, USA Rationale: Exacerbations of COPD are managed differently, but whether treatment of one exacerbation predicts the likelihood of subsequent events is unknown. Objective: We examined whether the treatment given for exacerbations predicted subsequent outcomes. Methods: This was a post-hoc analysis of 17,135 patients with COPD from TIOtropium Safety and Performance In Respimat® (TIOSPIR®. Patients treated with tiotropium with one or more moderate to severe exacerbations on study were analyzed using descriptive statistics, logistic and Cox regression analysis, and Kaplan–Meier plots. Results: Of 8,061 patients with moderate to severe exacerbation(s, demographics were similar across patients with exacerbations treated with antibiotics and/or steroids or hospitalization. Exacerbations treated with systemic corticosteroids alone or in combination with antibiotics had the highest risk of subsequent exacerbation (HR: 1.21, P=0.0004 and HR: 1.33, P<0.0001, respectively, and a greater risk of having a hospitalized (severe exacerbation (HR: 1.59 and 1.63, P<0.0001, respectively or death (HR: 1.50, P=0.0059 and HR: 1.47, P=0.0002, respectively compared with exacerbations treated

  9. Increased neutrophil expression of pattern recognition receptors during COPD exacerbations

    NARCIS (Netherlands)

    Pouwels, Simon D.; Van Geffen, Wouter H.; Jonker, Marnix R.; Kerstjens, Huib A. M.; Nawijn, Martijn C.; Heijink, Irene H.

    Previously, we observed increased serum levels of damage-associated molecular patterns (DAMPs) during COPD exacerbations. Here, gene expression of DAMP receptors was measured in peripheral blood neutrophils of COPD patients during stable disease and severe acute exacerbation. The expression of

  10. High-fat diets and seizure control in myoclonic-astatic epilepsy: a single center's experience.

    Science.gov (United States)

    Simard-Tremblay, Elisabeth; Berry, Patricia; Owens, Aaron; Cook, William Byron; Sittner, Haley R; Mazzanti, Marta; Huber, Jennifer; Warner, Molly; Shurtleff, Hillary; Saneto, Russell P

    2015-02-01

    To determine the efficacy of the Modified Atkins Diet (MAD) and Ketogenic Diet (KD) in seizure control within a population of myoclonic-astatic epilepsy (MAE) patients. This was a retrospective, single center study evaluating the seizure control by high fat diets. Seizure diaries kept by the parents performed seizure counts. All patients met the clinical criteria for MAE. Nine patients met the clinical criteria. We found that both the MAD and KD were efficacious in complete seizure control and allowed other medications to be stopped in seven patients. Two patients had greater than 90% seizure control without medications, one on the KD and the other on the MAD. Seizure freedom has ranged from 13 to 36 months, and during this time four patients have been fully weaned off of diet management. One patient was found to have a mutation in SLC2A1. Our results suggest that strictly defined MAE patients respond to the MAD with prolonged seizure control. Some patients may require the KD for seizure freedom, suggesting a common pathway of increased requirement for fats. Once controlled, those fully responsive to the Diet(s) could be weaned off traditional seizure medications and in many, subsequently off the MAD or KD. Copyright © 2014 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  11. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  12. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  13. Does Autoimmunity have a Role in Myoclonic Astatic Epilepsy? A Case Report of Voltage Gated Potassium Channel Mediated Seizures.

    Science.gov (United States)

    Sirsi, Deepa; Dolce, Alison; Greenberg, Benjamin M; Thodeson, Drew

    2016-01-01

    There is expanding knowledge about the phenotypic variability of patients with voltage gated potassium channel complex (VGKC) antibody mediated neurologic disorders. The phenotypes are diverse and involve disorders of the central and peripheral nervous systems. The central nervous system manifestations described in the literature include limbic encephalitis, status epilepticus, and acute encephalitis. We report a 4.5 year-old boy who presented with intractable Myoclonic Astatic Epilepsy (MAE) or Doose syndrome and positive VGKC antibodies in serum. Treatment with steroids led to resolution of seizures and electrographic normalization. This case widens the spectrum of etiologies for MAE to include autoimmunity, in particular VGKC auto-antibodies and CNS inflammation, as a primary or contributing factor. There is an evolving understanding of voltage gated potassium channel complex mediated autoimmunity in children and the role of inflammation and autoimmunity in MAE and other intractable pediatric epilepsy syndromes remains to be fully defined. A high index of suspicion is required for diagnosis and appropriate management of antibody mediated epilepsy syndromes.

  14. Asthma Exacerbations and Unconventional Natural Gas Development in the Marcellus Shale

    Science.gov (United States)

    Rasmussen, Sara G.; Ogburn, Elizabeth L.; McCormack, Meredith; Casey, Joan A.; Bandeen-Roche, Karen; Mercer, Dione G.; Schwartz, Brian S.

    2017-01-01

    Importance Asthma is common and can be exacerbated by air pollution and stress. Unconventional natural gas development (UNGD) has community and environmental impacts. In Pennsylvania, development began in 2005 and by 2012, 6,253 wells were drilled. There are no prior studies of UNGD and objective respiratory outcomes. Objective To evaluate associations between UNGD and asthma exacerbations. Design A nested case-control study comparing asthma patients with exacerbations to asthma patients without exacerbations from 2005–12. Setting The Geisinger Clinic, which provides primary care services to over 400,000 patients in Pennsylvania. Participants Asthma patients aged 5–90 years (n = 35,508) were identified in electronic health records; those with exacerbations were frequency-matched on age, sex, and year of event to those without. Exposure(s) On the day before each patient’s index date (cases: date of event or medication order; controls: contact date), we estimated UNGD activity metrics for four phases (pad preparation, drilling, stimulation [“fracking”], and production) using distance from the patient’s home to the well, well characteristics, and the dates and durations of phases. Main Outcome(s) and Measure(s) We identified mild, moderate, and severe asthma exacerbations (new oral corticosteroid medication order, emergency department encounter, and hospitalization, respectively). Results We identified 20,749 mild, 1,870 moderate, and 4,782 severe asthma exacerbations, and frequency-matched these to 18,693, 9,350, and 14,104 control index dates, respectively. In three-level adjusted models, there was an association between the highest group of the activity metric for each UNGD phase compared to the lowest group for 11 out of 12 UNGD-outcome pairs (odds ratios [95% CI] ranged from 1.5 [1.2–1.7] for the association of the pad metric with severe exacerbations to 4.4 [3.8–5.2] for the association of the production metric with mild exacerbations). Six of

  15. The profile of psychiatric symptoms exacerbated by methamphetamine use.

    Science.gov (United States)

    McKetin, Rebecca; Dawe, Sharon; Burns, Richard A; Hides, Leanne; Kavanagh, David J; Teesson, Maree; McD Young, Ross; Voce, Alexandra; Saunders, John B

    2016-04-01

    Methamphetamine use can produce symptoms almost indistinguishable from schizophrenia. Distinguishing between the two conditions has been hampered by the lack of a validated symptom profile for methamphetamine-induced psychiatric symptoms. We use data from a longitudinal cohort study to examine the profile of psychiatric symptoms that are acutely exacerbated by methamphetamine use. 164 methamphetamine users, who did not meet DSM-IV criteria for a lifetime primary psychotic disorder, were followed monthly for one year to assess the relationship between days of methamphetamine use and symptom severity on the 24-item Brief Psychiatric Rating Scale. Exacerbation of psychiatric symptoms with methamphetamine use was quantified using random coefficient models. The dimensions of symptom exacerbation were examined using principal axis factoring and a latent profile analysis. Symptoms exacerbated by methamphetamine loaded on three factors: positive psychotic symptoms (suspiciousness, unusual thought content, hallucinations, bizarre behavior); affective symptoms (depression, suicidality, guilt, hostility, somatic concern, self-neglect); and psychomotor symptoms (tension, excitement, distractibility, motor hyperactivity). Methamphetamine use did not significantly increase negative symptoms. Vulnerability to positive psychotic and affective symptom exacerbation was shared by 28% of participants, and this vulnerability aligned with a past year DSM-IV diagnosis of substance-induced psychosis (38% vs. 22%, χ(2)(df1)=3.66, p=0.056). Methamphetamine use produced a symptom profile comprised of positive psychotic and affective symptoms, which aligned with a diagnosis of substance-induced psychosis, with no evidence of a negative syndrome. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. Accelerated extracellular matrix turnover during exacerbations of COPD

    DEFF Research Database (Denmark)

    Sand, Jannie M B; Knox, Alan J; Lange, Peter

    2015-01-01

    progression. Extracellular matrix (ECM) turnover reflects activity in tissues and consequently assessment of ECM turnover may serve as biomarkers of disease activity. We hypothesized that the turnover of lung ECM proteins were altered during exacerbations of COPD. METHODS: 69 patients with COPD hospitalised...... of circulating fragments of structural proteins, which may serve as markers of disease activity. This suggests that patients with COPD have accelerated ECM turnover during exacerbations which may be related to disease progression....

  17. Clinical Characteristics of Exacerbation-Prone Adult Asthmatics Identified by Cluster Analysis.

    Science.gov (United States)

    Kim, Mi Ae; Shin, Seung Woo; Park, Jong Sook; Uh, Soo Taek; Chang, Hun Soo; Bae, Da Jeong; Cho, You Sook; Park, Hae Sim; Yoon, Ho Joo; Choi, Byoung Whui; Kim, Yong Hoon; Park, Choon Sik

    2017-11-01

    Asthma is a heterogeneous disease characterized by various types of airway inflammation and obstruction. Therefore, it is classified into several subphenotypes, such as early-onset atopic, obese non-eosinophilic, benign, and eosinophilic asthma, using cluster analysis. A number of asthmatics frequently experience exacerbation over a long-term follow-up period, but the exacerbation-prone subphenotype has rarely been evaluated by cluster analysis. This prompted us to identify clusters reflecting asthma exacerbation. A uniform cluster analysis method was applied to 259 adult asthmatics who were regularly followed-up for over 1 year using 12 variables, selected on the basis of their contribution to asthma phenotypes. After clustering, clinical profiles and exacerbation rates during follow-up were compared among the clusters. Four subphenotypes were identified: cluster 1 was comprised of patients with early-onset atopic asthma with preserved lung function, cluster 2 late-onset non-atopic asthma with impaired lung function, cluster 3 early-onset atopic asthma with severely impaired lung function, and cluster 4 late-onset non-atopic asthma with well-preserved lung function. The patients in clusters 2 and 3 were identified as exacerbation-prone asthmatics, showing a higher risk of asthma exacerbation. Two different phenotypes of exacerbation-prone asthma were identified among Korean asthmatics using cluster analysis; both were characterized by impaired lung function, but the age at asthma onset and atopic status were different between the two. Copyright © 2017 The Korean Academy of Asthma, Allergy and Clinical Immunology · The Korean Academy of Pediatric Allergy and Respiratory Disease

  18. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  19. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  20. [The Chinese experts' consensus on the evaluation and management of asthma exacerbation].

    Science.gov (United States)

    2018-01-01

    Asthma exacerbations can do a lot of harm to the patients and consume large amounts of medical resources. This consensus is based on the domestic and foreign guidelines and literatures to standardize the evaluation and management of asthma exacerbations in China. Asthma exacerbations are characterized by a progressive increase in symptoms of shortness of breath, cough, wheezing or chest tightness and progressive decrease in lung function, and usually require modification of treatment. Recognizing risk factors and triggering factors of asthma exacerbations is helpful for the prevention and long-term management. Evaluation of asthma exacerbations is based on symptoms, lung function, and arterial blood gas. Management is stratified according to the severity of disease. Different regimens to treat asthma exacerbations are discussed in this consensus. Glucocorticoids should be used properly. Overuse of antibiotics should be avoided. Management of life-threatening asthma is discussed separately. Special attention should be paid in some special respects, such as asthma during peri-operation period, gestation period, and childhood. Diagnosis and management of complications are also of great significance and are discussed in details.

  1. Home-Based Telehealth Hospitalization for Exacerbation of Chronic Obstructive Pulmonary Disease

    DEFF Research Database (Denmark)

    Jakobsen, Anna Svarre; Laursen, Lars C; Rydahl-Hansen, Susan

    2015-01-01

    Background: Telehealth interventions for patients with chronic obstructive pulmonary disease (COPD) have focused primarily on stable outpatients. Telehealth designed to handle the acute exacerbation that normally requires hospitalization could also be of interest. The aim of this study...... was to compare the effect of home-based telehealth hospitalization with conventional hospitalization for exacerbation in severe COPD. Materials and Methods: A two-center, noninferiority, randomized, controlled effectiveness trial was conducted between June 2010 and December 2011. Patients with severe COPD...... admitted because of exacerbation were randomized 1:1 either to home-based telehealth hospitalization or to continue standard treatment and care at the hospital. The primary outcome was treatment failure defined as re-admission due to exacerbation in COPD within 30 days after initial discharge...

  2. Postpartum airway responsiveness and exacerbation of asthma during pregnancy

    DEFF Research Database (Denmark)

    Ali, Zarqa; Nilas, Lisbeth; Ulrik, Charlotte Suppli

    2017-01-01

    , diffusing capacity for carbon monoxide, bronchial responsiveness to inhaled mannitol, and inflammatory characteristics in induced sputum. Obtained data were analyzed in relation to exacerbation status during pregnancy. The PD15 is defined as the cumulative administered dose causing a 15% decline in forced......BACKGROUND: Airway responsiveness and inflammation are associated with the clinical manifestations of asthma and the response to pharmacological therapy. OBJECTIVE: To investigate if airway responsiveness and inflammatory characteristics are related to asthma exacerbations during pregnancy....... MATERIALS AND METHODS: In women with asthma who were prescribed controller medication and monitored closely during pregnancy, the risk of exacerbations was analyzed in relation to postpartum measures of fractional exhaled nitric oxide (FENO), skin prick test reactivity, static and dynamic lung volumes...

  3. Inflammatory bowel disease exacerbation associated with Epstein-Barr virus infection.

    Science.gov (United States)

    Dimitroulia, Evangelia; Pitiriga, Vassiliki C; Piperaki, Evangelia-Theophano; Spanakis, Nicholas E; Tsakris, Athanassios

    2013-03-01

    Epstein-Barr virus infection is associated with inflammatory bowel disease, but its role as a pathogenetic or exacerbating factor remains unclear. The aim of this study was to evaluate the association between Epstein-Barr virus infection and inflammatory bowel disease, particularly in regard to exacerbation of disease activity. This was a nonrandomized crosssectional study in subgroups of patients with inflammatory bowel disease compared with a control group with noninflammatory disease. Participants were patients treated for ulcerative colitis or Crohn's disease and individuals undergoing evaluation for noninflammatory disease recruited from 2 urban adult gastrointestinal referral centers in Greece. Diagnosis of inflammatory bowel disease was based on standard clinical and endoscopic criteria. Demographic and clinical characteristics of all participants were recorded. Whole blood samples and fresh tissue samples from biopsy of intestinal sites were obtained from each participant. The presence of Epstein-Barr virus was determined by amplifying the LMP1 gene of the virus in blood and intestinal tissue samples. The study comprised 94 patients with inflammatory bowel disease (63 with ulcerative colitis and 31 with Crohn's disease) and 45 controls with noninflammatory disease. Of the 94 patients, 67 (71.3%) had disease exacerbation and 27 (28.7%) were in remission. The prevalence of Epstein-Barr virus genome was significantly higher in patients than in controls for intestinal tissue (44 patients, 46.8% vs 6 controls, 13.3%; p = 0.001), but not for whole blood (24 patients, 25.5% vs 9 controls, 20%; p = 0.3). The viral genome was found significantly more frequently in intestinal samples from patients with disease exacerbation compared with patients in remission (38 patients with exacerbation, 56.7% vs 6 patients in remission, 22.2%; p = 0.001), but no significant difference was found for whole blood (18 patients with exacerbation, 26.8% vs 6 patients in remission, 22

  4. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  5. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  6. Preventing and managing exacerbations in COPD – critical appraisal of the role of tiotropium

    Directory of Open Access Journals (Sweden)

    Donald P Tashkin

    2010-02-01

    Full Text Available Donald P TashkinDepartment of Medicine, Division of Pulmonary and Critical Care Medicine, David Geffen School of Medicine at UCLA,Los Angeles, CA, USAAbstract: The course of COPD is punctuated by acute exacerbations that are associated with an increase in the morbidity and mortality related to this chronic disease and may contribute to its rate of progression. Therefore, preventing and treating exacerbations are major goals of COPD management. The role of tiotropium in the prevention of exacerbations has been investigated in several placebo-controlled randomized clinical trials varying in duration from 3 months to 4 years in patients with moderate to very severe COPD. In all of these trials, tiotropium has uniformly reduced the proportion of patients experiencing at least one exacerbation and delayed the time to the first exacerbation compared with placebo. In the longer trials (≥6 months’ duration tiotropium has also reduced the exposure-adjusted incidence rate of exacerbations. In trials of at least 1 year in duration, tiotropium either significantly reduced the risk of hospitalization for an exacerbation and/or the proportion of patients with an exacerbation-related hospitalization. In a meta-analysis that included 15 trials of tiotropium vs either placebo (n = 13 and/or a longacting beta-agonist (LABA; n = 4, tiotropium significantly reduced the odds of experiencing an exacerbation compared to placebo as well as a LABA. The potential additive benefits of tiotropium to those of a LABA and/or inhaled corticosteroid in reducing exacerbations require further investigation. The mechanism whereby tiotropium reduces exacerbations is not due to an anti-inflammatory effect but more likely relates to its property of causing a sustained increase in airway patency and reduction in hyperinflation, thereby counteracting the tendency for respiratory insults to worsen airflow obstruction and hyperinflation. For the management of acute exacerbations, an

  7. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  8. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  9. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  10. Impact and prevention of severe exacerbations of COPD: a review of the evidence

    Directory of Open Access Journals (Sweden)

    Halpin DMG

    2017-10-01

    Full Text Available David MG Halpin,1 Marc Miravitlles,2 Norbert Metzdorf,3 Bartolomé Celli4 1Department of Respiratory Medicine, Royal Devon and Exeter Hospital, Exeter, UK; 2Pneumology Department, Hospital Universitari Vall d’Hebron, CIBER de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 3Respiratory Medicine, Boehringer Ingelheim Pharma GmBH & Co KG, Ingelheim am Rhein, Germany; 4Pulmonary Division, Brigham and Women’s Hospital, Boston, MA, USA Abstract: Severe exacerbations of COPD, ie, those leading to hospitalization, have profound clinical implications for patients and significant economic consequences for society. The prevalence and burden of severe COPD exacerbations remain high, despite recognition of the importance of exacerbation prevention and the availability of new treatment options. Severe COPD exacerbations are associated with high mortality, have negative impact on quality of life, are linked to cardiovascular complications, and are a significant burden on the health-care system. This review identified risk factors that contribute to the development of severe exacerbations, treatment options (bronchodilators, antibiotics, corticosteroids [CSs], oxygen therapy, and ventilator support to manage severe exacerbations, and strategies to prevent readmission to hospital. Risk factors that are amenable to change have been highlighted. A number of bronchodilators have demonstrated successful reduction in risk of severe exacerbations, including long-acting muscarinic antagonist or long-acting β2-agonist mono- or combination therapies, in addition to vaccination, mucolytic and antibiotic therapy, and nonpharmacological interventions, such as pulmonary rehabilitation. Recognition of the importance of severe exacerbations is an essential step in improving outcomes for patients with COPD. Evidence-based approaches to prevent and manage severe exacerbations should be implemented as part of targeted strategies for disease management. Keywords

  11. Caffeine consumption and exacerbations of chronic obstructive pulmonary disease: Retrospective study

    Directory of Open Access Journals (Sweden)

    P.O. Lopes

    2015-09-01

    Full Text Available Background: The modulation of adenosine receptors has been proposed as new therapeutic target for chronic obstructive pulmonary disease, but studies in humans were negative. Caffeine is widely consumed and acts by non-selective modulation of these receptors, allowing for a non-interventional evaluation of the purinergic effects on COPD. We evaluated the effects of chronic caffeine consumption on the risk for COPD exacerbations. Methods: Retrospective study including patients with COPD. The total number of exacerbations during a three-year period and the mean daily caffeine consumption in the last twenty years were evaluated. A univariate and multiple regression analysis were performed for evaluation of the significant predictors of exacerbations. Results: A total of 90 patients were included. Most were males (82.2% and had a mean forced expiratory volume in the first second (FEV1 of 57.0 ± 17.1% predicted. The mean daily caffeine consumption was 149.7 ± 140.9 mg. There was no correlation between the mean caffeine consumption and exacerbations (p > 0.05. Discussion: Our results suggest that caffeine has no significant effect on the frequency of COPD exacerbations. These conclusions are limited by the sample size and the retrospective nature of the study. Keywords: COPD, Caffeine, Disease exacerbation, Purines, Pharmacology, Coffee, Respiratory Tract Diseases

  12. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  15. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  16. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  17. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  18. Factors for poor prognosis of near-fatal asthma after recovery from a life-threatening asthma attack.

    Science.gov (United States)

    Kim, Myung Shin; Cho, Young Joo; Moon, Hee Bom; Cho, Sang Heon

    2008-12-01

    The aim of this study was to investigate poor prognostic factors associated with a near-fatal asthma attack following patient recovery. We enrolled 68 patients who suffered near-fatal asthma attacks and were admitted to the intensive care units of five university hospitals. The patients were divided into two groups. The first group was comprised of patients who discontinued oral corticosteroids within 6 months after being discharged from the hospital and who maintained a forced expiratory volume in 1 s (FEV(1)) >/=60% of the maximum or estimated values of the corresponding patients. The second group included patients who continued on oral corticosteroids for >/=6 months or who maintained a FEV(1) asthma, factors for a poor prognosis included older age [48.47+/-3.53 vs. 64.69+/-2.59 years, pasthma, high values for inflammation-related laboratory markers (ESR, 8.75+/-2.05 vs. 23.88+/-4.40 mm/h, p=0.004; CRP, 1.72+/-0.46 vs. 6.68+/-9.36 mg/dL, pasthma exacerbated by pneumonia (28.1 vs. 52.8%, pasthma or the need for continual oral corticosteroids after being discharged from the hospital. Patients with these factors should be treated appropriately, under close surveillance.

  19. COPD exacerbations in general practice: variability in oral prednisolone courses

    Directory of Open Access Journals (Sweden)

    de Vries Marianne

    2012-01-01

    Full Text Available Abstract Background The use of oral corticosteroids as treatment of COPD exacerbations in primary care is well established and evidence-based. However, the most appropriate dosage regimen has not been determined and remains controversial. Corticosteroid therapy is associated with a number of undesirable side effects, including hyperglycaemias, so differences in prescribing might be relevant. This study examines the differences between GPs in dosage and duration of prednisolone treatment in patients with a COPD exacerbation. It also investigates the number of general practitioners (GPs who adjust their treatment according to the presence of diabetic co-morbidity. Methods Cross-sectional study among 219 GPs and 25 GPs in training, located in the Northern part of the Netherlands. Results The response rate was 69%. Nearly every GP prescribed a continuous dose of prednisolone 30 mg per day. Among GPs there were substantial differences in treatment duration. GPs prescribed courses of five, seven, ten, or fourteen days. A course of seven days was most common. The duration of treatment depended on exacerbation and disease severity. A course of five days was especially prescribed in case of a less severe exacerbation. In a more severe exacerbation duration of seven to fourteen days was more common. Hardly any GP adjusted treatment to the presence of diabetic co-morbidity. Conclusion Under normal conditions GPs prescribe prednisolone quite uniformly, within the range of the current Dutch guidelines. There is insufficient guidance regarding how to adjust corticosteroid treatment to exacerbation severity, disease severity and the presence of diabetic co-morbidity. Under these circumstances, there is a substantial variation in treatment duration.

  20. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  1. Job strain and the risk of severe asthma exacerbations

    DEFF Research Database (Denmark)

    Heikkilä, K; Madsen, I E H; Nyberg, S T

    2014-01-01

    BACKGROUND: Many patients and healthcare professionals believe that work-related psychosocial stress, such as job strain, can make asthma worse, but this is not corroborated by empirical evidence. We investigated the associations between job strain and the incidence of severe asthma exacerbations...... in working-age European men and women. METHODS: We analysed individual-level data, collected between 1985 and 2010, from 102 175 working-age men and women in 11 prospective European studies. Job strain (a combination of high demands and low control at work) was self-reported at baseline. Incident severe...... asthma exacerbations were ascertained from national hospitalization and death registries. Associations between job strain and asthma exacerbations were modelled using Cox regression and the study-specific findings combined using random-effects meta-analyses. RESULTS: During a median follow-up of 10 years...

  2. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  3. Mannose-binding lectin deficiency and acute exacerbations of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Woodruff PG

    2012-11-01

    Full Text Available Richard K Albert,1 John Connett,2 Jeffrey L Curtis,3,4 Fernando J Martinez,3 MeiLan K Han,3 Stephen C Lazarus,5 Prescott G Woodruff51Medicine Service, Denver Health and Department of Medicine, University of Colorado Denver, Denver, CO, 2Division of Biostatistics, School of Public Health, University of Minnesota, Minneapolis, MN, 3Pulmonary and Critical Care Medicine, Department of Medicine, University of Michigan, Ann Arbor, MI, 4Pulmonary and Critical Care Medicine, VA Medical Center, Ann Arbor, MI, 5Pulmonary and Critical Care Medicine, Department of Medicine, and Cardiovascular Research Institute, University of California, San Francisco, CA, USABackground: Mannose-binding lectin is a collectin involved in host defense against infection. Whether mannose-binding lectin deficiency is associated with acute exacerbations of chronic obstructive pulmonary disease is debated.Methods: Participants in a study designed to determine if azithromycin taken daily for one year decreased acute exacerbations had serum mannose-binding lectin concentrations measured at the time of enrollment.Results: Samples were obtained from 1037 subjects (91% in the trial. The prevalence of mannose-binding lectin deficiency ranged from 0.5% to 52.2%, depending on how deficiency was defined. No differences in the prevalence of deficiency were observed with respect to any demographic variable assessed, and no differences were observed in time to first exacerbation, rate of exacerbations, or percentage of subjects requiring hospitalization for exacerbations in those with deficiency versus those without, regardless of how deficiency was defined.Conclusion: In a large sample of subjects with chronic obstructive pulmonary disease selected for having an increased risk of experiencing an acute exacerbation of chronic obstructive pulmonary disease, only 1.9% had mannose-binding lectin concentrations below the normal range and we found no association between mannose-binding lectin

  4. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  5. Statistical analysis of exacerbation rates in COPD: TRISTAN and ISOLDE revisited

    DEFF Research Database (Denmark)

    Keene, O N; Calverley, P M A; Jones, P W

    2008-01-01

    different analysis methods, we have reanalysed data from two large studies which, among other objectives, investigated the effectiveness of inhaled corticosteroids in reducing COPD exacerbation rates. Using the negative binomial model to reanalyse data from the TRISTAN and ISOLDE studies, the overall...... estimates of exacerbation rates on each treatment arm are higher and the confidence intervals for comparisons between treatments are wider, but the overall conclusions of TRISTAN and ISOLDE regarding reduction of exacerbations remain unchanged. The negative binomial approach appears to provide a better fit...

  6. Exacerbations of COPD and symptoms of gastroesophageal reflux: a systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Thiago Mamoru Sakae

    2013-06-01

    Full Text Available OBJECTIVE: To examine the relationship between gastroesophageal reflux (GER and COPD exacerbations. METHODS: We conducted a systematic search of various electronic databases for articles published up through December of 2012. Studies considered eligible for inclusion were those dealing with COPD, COPD exacerbations, and GER; comparing at least two groups (COPD vs. controls or GER vs. controls; and describing relative risks (RRs and prevalence ratios-or ORs and their respective 95% CIs (or presenting enough data to allow further calculations for the association between GER and COPD-as well as exacerbation rates. Using a standardized form, we extracted data related to the study design; criteria for GER diagnosis; age, gender, and number of participants; randomization method; severity scores; methods of evaluating GER symptoms; criteria for defining exacerbations; exacerbation rates (hospitalizations, ER visits, unscheduled clinic visits, prednisone use, and antibiotic use; GER symptoms in COPD group vs. controls; mean number of COPD exacerbations (with symptoms vs. without symptoms; annual frequency of exacerbations; GER treatment; and severity of airflow obstruction. RESULTS: Overall, GER was clearly identified as a risk factor for COPD exacerbations (RR = 7.57; 95% CI: 3.84-14.94, with an increased mean number of exacerbations per year (mean difference: 0.79; 95% CI: 0.22-1.36. The prevalence of GER was significantly higher in patients with COPD than in those without (RR = 13.06; 95% CI: 3.64-46.87; p < 0.001. CONCLUSIONS: GER is a risk factor for COPD exacerbations. The role of GER in COPD management should be studied in greater detail.

  7. Glycogen Phosphomonoester Distribution in Mouse Models of the Progressive Myoclonic Epilepsy, Lafora Disease*

    Science.gov (United States)

    DePaoli-Roach, Anna A.; Contreras, Christopher J.; Segvich, Dyann M.; Heiss, Christian; Ishihara, Mayumi; Azadi, Parastoo; Roach, Peter J.

    2015-01-01

    Glycogen is a branched polymer of glucose that acts as an energy reserve in many cell types. Glycogen contains trace amounts of covalent phosphate, in the range of 1 phosphate per 500–2000 glucose residues depending on the source. The function, if any, is unknown, but in at least one genetic disease, the progressive myoclonic epilepsy Lafora disease, excessive phosphorylation of glycogen has been implicated in the pathology by disturbing glycogen structure. Some 90% of Lafora cases are attributed to mutations of the EPM2A or EPM2B genes, and mice with either gene disrupted accumulate hyperphosphorylated glycogen. It is, therefore, of importance to understand the chemistry of glycogen phosphorylation. Rabbit skeletal muscle glycogen contained covalent phosphate as monoesters of C2, C3, and C6 carbons of glucose residues based on analyses of phospho-oligosaccharides by NMR. Furthermore, using a sensitive assay for glucose 6-P in hydrolysates of glycogen coupled with measurement of total phosphate, we determined the proportion of C6 phosphorylation in rabbit muscle glycogen to be ∼20%. C6 phosphorylation also accounted for ∼20% of the covalent phosphate in wild type mouse muscle glycogen. Glycogen phosphorylation in Epm2a−/− and Epm2b−/− mice was increased 8- and 4-fold compared with wild type mice, but the proportion of C6 phosphorylation remained unchanged at ∼20%. Therefore, our results suggest that C2, C3, and/or C6 phosphate could all contribute to abnormal glycogen structure or to Lafora disease. PMID:25416783

  8. Frequency of exacerbations in patients with chronic obstructive pulmonary disease: an analysis of the SPIROMICS cohort.

    Science.gov (United States)

    Han, MeiLan K; Quibrera, Pedro M; Carretta, Elizabeth E; Barr, R Graham; Bleecker, Eugene R; Bowler, Russell P; Cooper, Christopher B; Comellas, Alejandro; Couper, David J; Curtis, Jeffrey L; Criner, Gerard; Dransfield, Mark T; Hansel, Nadia N; Hoffman, Eric A; Kanner, Richard E; Krishnan, Jerry A; Martinez, Carlos H; Pirozzi, Cheryl B; O'Neal, Wanda K; Rennard, Stephen; Tashkin, Donald P; Wedzicha, Jadwiga A; Woodruff, Prescott; Paine, Robert; Martinez, Fernando J

    2017-08-01

    Present treatment strategies to stratify exacerbation risk in patients with chronic obstructive pulmonary disease (COPD) rely on a history of two or more events in the previous year. We aimed to understand year to year variability in exacerbations and factors associated with consistent exacerbations over time. In this longitudinal, prospective analysis of exacerbations in the Subpopulations and Intermediate Outcome Measures in COPD Study (SPIROMICS) cohort, we analysed patients aged 40-80 years with COPD for whom 3 years of prospective data were available, identified through various means including care at academic and non-academic medical centres, word of mouth, and existing patient registries. Participants were enrolled in the study between Nov 12, 2010, and July 31, 2015. We classified patients according to yearly exacerbation frequency: no exacerbations in any year; one exacerbation in every year during 3 years of follow-up; and those with inconsistent exacerbations (individuals who had both years with exacerbations and years without during the 3 years of follow-up). Participants were characterised by the Global Initiative for Chronic Obstructive Lung Disease (GOLD) spirometric category (1-4) on the basis of post-bronchodilator FEV 1 . Stepwise logistic regression was used to compare factors associated with one or more acute exacerbations of COPD every year for 3 years versus no exacerbations in the same timeframe. Additionally, a stepwise zero-inflated negative binomial model was used to assess predictors of exacerbation count during follow-up in all patients with available data. Baseline symptom burden was assessed with the COPD assessment test. This trial is registered with ClinicalTrials.gov, number NCT01969344. 2981 patients were enrolled during the study. 1843 patients had COPD, of which 1105 patients had 3 years of complete, prospective follow-up data. 538 (49%) of 1105 patients had at least one acute exacerbation during the 3 years of follow-up, whereas

  9. A search for covert precipitating clinical parameters in frequent exacerbators of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Ankit Bhatia

    2016-01-01

    Full Text Available Introduction: Acute exacerbations are a significant source of morbidity and mortality associated with chronic obstructive pulmonary disease (COPD. Some patients suffer an inordinate number of exacerbations while others remain relatively protected. The aim of this study was to evaluate the potentially modifiable precipitating parameters of frequent severe exacerbations requiring hospital admission in COPD. Materials and Methods: Consecutive patients admitted with acute exacerbation of COPD for a period of one year in a tertiary care hospital were evaluated prospectively. Data regarding the number of exacerbations in the previous year, current comorbidities, medications, and clinical and functional status of COPD patients were evaluated. Results: We included 98 COPD patients (81.63% men admitted consecutively with exacerbations in our department. The mean number of severe exacerbations was (2.42 per patient/per year, and 65% of the patients had frequent severe exacerbations. Multivariate analysis indicated that serum uric acid, serum total IgE, depression and anxiety, gastroesophageal reflux disease symptoms, air pollution, poor adherence to inhaled therapy, and irregular outpatient followup visits were independent predictors of frequent severe exacerbations. Conclusion: COPD patients with frequent exacerbations should be carefully assessed for modifiable confounding risk factors regardless of poor lung function to decrease exacerbation frequency and related poor prognosis. Raised serum total IgE levels may point towards atopy as an additional comorbidity in COPD while uric acid can have a clinically useful role in risk stratification in a primary care setting.

  10. Reduced COPD Exacerbation Risk Correlates With Improved FEV1: A Meta-Regression Analysis.

    Science.gov (United States)

    Zider, Alexander D; Wang, Xiaoyan; Buhr, Russell G; Sirichana, Worawan; Barjaktarevic, Igor Z; Cooper, Christopher B

    2017-09-01

    The mechanism by which various classes of medication reduce COPD exacerbation risk remains unknown. We hypothesized a correlation between reduced exacerbation risk and improvement in airway patency as measured according to FEV 1 . By systematic review, COPD trials were identified that reported therapeutic changes in predose FEV 1 (dFEV 1 ) and occurrence of moderate to severe exacerbations. Using meta-regression analysis, a model was generated with dFEV 1 as the moderator variable and the absolute difference in exacerbation rate (RD), ratio of exacerbation rates (RRs), or hazard ratio (HR) as dependent variables. The analysis of RD and RR included 119,227 patients, and the HR analysis included 73,475 patients. For every 100-mL change in predose FEV 1 , the HR decreased by 21% (95% CI, 17-26; P < .001; R 2  = 0.85) and the absolute exacerbation rate decreased by 0.06 per patient per year (95% CI, 0.02-0.11; P = .009; R 2  = 0.05), which corresponded to an RR of 0.86 (95% CI, 0.81-0.91; P < .001; R 2  = 0.20). The relationship with exacerbation risk remained statistically significant across multiple subgroup analyses. A significant correlation between increased FEV 1 and lower COPD exacerbation risk suggests that airway patency is an important mechanism responsible for this effect. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  11. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  12. Serum eosinophil cationic protein levels can be useful for predicting acute exacerbation of asthma

    Directory of Open Access Journals (Sweden)

    Mitsuhiro Kamimura

    1998-01-01

    Full Text Available We report on a case in which five consecutive exacerbations of asthma were monitored by following serum eosinophil cationic protein (ECP levels. The serum ECP level correlated well with each exacerbation and tended to increase even before the exacerbations of asthma became apparent. This case shows that serum levels of ECP can be useful markers of disease activity and may also be predictive markers for acute exacerbation.

  13. Impact of family support on psychiatric disorders and seizure control in patients with juvenile myoclonic epilepsy.

    Science.gov (United States)

    Jayalakshmi, Sita; Padmaja, Gaddamanugu; Vooturi, Sudhindra; Bogaraju, Anand; Surath, Mohandas

    2014-08-01

    Psychiatric disorders (PDs) are frequently observed in patients with juvenile myoclonic epilepsy (JME). In this study, we aimed to assess factors associated with PDs in patients with JME. Retrospective analysis of data of 90 consecutive patients with JME was performed. Assessment of DSM-IV Axis I clinical disorders was done using Structured Clinical Interview for Axis I. Diagnosis of PDs is made when the score exceeds the threshold provided by the DSM-IV. We also applied the Global Assessment of Functioning (GAF) scale which is part of the multiaxial evaluation of the DSM-IV (Axis-V). Using seizure frequency score at presentation, we classified subjects into controlled and uncontrolled groups. In the current cohort, 29 (32.2%) patients were diagnosed with PDs. Fewer patients with PDs had family support (48.3% vs. 83.6%; p=0.001). Lifetime prevalence of PDs was higher among patients with current PDs (96.6% vs. 18.0%; pseizure control (7.8% vs. 73.1%; pseizure control. Patients with lack of family support had poor seizure control (0% vs. 36.9%; pseizure control and higher incidence of PDs in patients with JME. Lack of family support increases neither the odds of PDs nor seizure control. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Exacerbations of chronic obstructive pulmonary disease: when are antibiotics indicated? A systematic review

    Directory of Open Access Journals (Sweden)

    Steurer Johann

    2007-04-01

    Full Text Available Abstract Background For decades, there is an unresolved debate about adequate prescription of antibiotics for patients suffering from exacerbations of chronic obstructive pulmonary disease (COPD. The aim of this systematic review was to analyse randomised controlled trials investigating the clinical benefit of antibiotics for COPD exacerbations. Methods We conducted a systematic review of randomised, placebo-controlled trials assessing the effects of antibiotics on clinically relevant outcomes in patients with an exacerbation. We searched bibliographic databases, scrutinized reference lists and conference proceedings and asked the pharmaceutical industry for unpublished data. We used fixed-effects models to pool results. The primary outcome was treatment failure of COPD exacerbation treatment. Results We included 13 trials (1557 patients of moderate to good quality. For the effects of antibiotics on treatment failure there was much heterogeneity across all trials (I2 = 82%. Meta-regression revealed severity of exacerbation as significant explanation for this heterogeneity (p = 0.016: Antibiotics did not reduce treatment failures in outpatients with mild to moderate exacerbations (pooled odds ratio 1.09, 95% CI 0.75–1.59, I2 = 18%. Inpatients with severe exacerbations had a substantial benefit on treatment failure rates (pooled odds ratio of 0.25, 95% CI 0.16–0.39, I2 = 0%; number-needed to treat of 4, 95% CI 3–5 and on mortality (pooled odds ratio of 0.20, 95% CI 0.06–0.62, I2 = 0%; number-needed to treat of 14, 95% CI 12–30. Conclusion Antibiotics effectively reduce treatment failure and mortality rates in COPD patients with severe exacerbations. For patients with mild to moderate exacerbations, antibiotics may not be generally indicated and further research is needed to guide antibiotic prescription in these patients.

  15. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  17. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  18. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  19. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  1. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  2. Gastro-esophageal reflux disease and exacerbations in chronic obstructive pulmonary disease.

    Science.gov (United States)

    Ingebrigtsen, Truls S; Marott, Jacob L; Vestbo, Jørgen; Nordestgaard, Børge G; Hallas, Jesper; Lange, Peter

    2015-01-01

    We tested the hypothesis that gastro-esophageal reflux disease is a risk factor for exacerbations in individuals with chronic obstructive pulmonary disease (COPD). Among 9622 participants in the Copenhagen City Heart Study, we identified 1259 individuals with COPD and information on gastro-esophageal reflux disease and the regular use of acid inhibitory treatment. These individuals were followed for 5 years with regard to medically treated COPD exacerbations, which we defined as a short course treatment with oral corticosteroids alone or in combination with antibiotics. We applied a multivariable Cox regression analysis with adjustment for well-established risk factors associated with COPD exacerbations or gastro-esophageal reflux disease, including COPD severity, and symptoms. Individuals with COPD and gastro-esophageal reflux disease had more chronic bronchitis (31 vs 21%, P = 0.004), more breathlessness (39 vs 22%, P gastro-esophageal reflux disease. Among individuals with COPD and gastro-esophageal reflux disease, those who did not use acid inhibitory treatment regularly had an increased risk of COPD exacerbations during follow-up, hazards ratio (HR): HR = 2.7 (1.3-5.4, P = 0.006). Individuals with gastro-esophageal reflux disease, using acid inhibitory treatment regularly did not have an increased risk of exacerbations, HR = 1.2 (0.6-2.7, P = 0.63). Gastro-esophageal reflux disease was associated with an increased risk of medically treated exacerbations of COPD, but only in those individuals who did not use acid inhibitory treatment regularly. © 2014 Asian Pacific Society of Respirology.

  3. Predictors of frequent exacerbations in (ex)smoking and never smoking adults with severe asthma

    NARCIS (Netherlands)

    Westerhof, Guus A.; de Groot, Jantina C.; Amelink, Marijke; de Nijs, Selma B.; ten Brinke, Anneke; Weersink, Els J.; Bel, Elisabeth H.

    2016-01-01

    Persistent eosinophilic airway inflammation is an important driver for asthma exacerbations in non-smokers with asthma. Whether eosinophilic inflammation is also a predictor of asthma exacerbations in (ex)smokers is not known. The aim was to investigate factors associated with frequent exacerbations

  4. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  5. Long-term future risk of severe exacerbations: Distinct 5-year trajectories of problematic asthma.

    Science.gov (United States)

    Yii, A C A; Tan, J H Y; Lapperre, T S; Chan, A K W; Low, S Y; Ong, T H; Tan, K L; Chotirmall, S H; Sterk, P J; Koh, M S

    2017-09-01

    Assessing future risk of exacerbations is an important component of asthma management. Existing studies have investigated short- but not long-term risk. Problematic asthma patients with unfavorable long-term disease trajectory and persistently frequent severe exacerbations need to be identified early to guide treatment. To identify distinct trajectories of severe exacerbation rates among "problematic asthma" patients and develop a risk score to predict the most unfavorable trajectory. Severe exacerbation rates over five years for 177 "problematic asthma" patients presenting to a specialist asthma clinic were tracked. Distinct trajectories of severe exacerbation rates were identified using group-based trajectory modeling. Baseline predictors of trajectory were identified and used to develop a clinical risk score for predicting the most unfavorable trajectory. Three distinct trajectories were found: 58.5% had rare intermittent severe exacerbations ("infrequent"), 32.0% had frequent severe exacerbations at baseline but improved subsequently ("nonpersistently frequent"), and 9.5% exhibited persistently frequent severe exacerbations, with the highest incidence of near-fatal asthma ("persistently frequent"). A clinical risk score composed of ≥2 severe exacerbations in the past year (+2 points), history of near-fatal asthma (+1 point), body mass index ≥25kg/m 2 (+1 point), obstructive sleep apnea (+1 point), gastroesophageal reflux (+1 point), and depression (+1 point) was predictive of the "persistently frequent" trajectory (area under the receiver operating characteristic curve: 0.84, sensitivity 72.2%, specificity 81.1% using cutoff ≥3 points). The trajectories and clinical risk score had excellent performance in an independent validation cohort. Patients with problematic asthma follow distinct illness trajectories over a period of five years. We have derived and validated a clinical risk score that accurately identifies patients who will have persistently

  6. Virus-induced asthma attack: The importance of allergic inflammation in response to viral antigen in an animal model of asthma.

    Science.gov (United States)

    Skappak, Christopher; Ilarraza, Ramses; Wu, Ying-Qi; Drake, Matthew G; Adamko, Darryl J

    2017-01-01

    Asthma exacerbation can be a life-threatening condition, and is most often triggered by common respiratory viruses. Poor asthma control and worsening of respiratory function is associated with increased airway inflammation, including eosinophilia. Prevention of asthma exacerbation relies on treatment with corticosteroids, which preferentially inhibit allergic inflammation like eosinophils. Human studies demonstrate that inactivated virus can trigger eosinophil activation in vitro through antigen presentation and memory CD4+ lymphocytes. We hypothesized that animals with immunologic memory to a respiratory virus would also develop airway hyperresponsiveness in response to a UV-inactivated form of the virus if they have pre-existing allergic airway inflammation. Guinea pigs were ovalbumin-sensitized, infected with live parainfluenza virus (PIV), aerosol-challenged with ovalbumin, and then re-inoculated 60 days later with live or UV-inactivated PIV. Some animals were either treated with dexamethasone prior to the second viral exposure. Lymphocytes were isolated from parabronchial lymph nodes to confirm immunologic memory to the virus. Airway reactivity was measured and inflammation was assessed using bronchoalveolar lavage and lung histology. The induction of viral immunologic memory was confirmed in infected animals. Allergen sensitized and challenged animals developed airway hyperreactivity with eosinophilic airway inflammation when re-exposed to UV-inactivated PIV, while non-sensitized animals did not. Airway hyperreactivity in the sensitized animals was inhibited by pre-treatment with dexamethasone. We suggest that the response of allergic inflammation to virus antigen is a significant factor causing asthma exacerbation. We propose that this is one mechanism explaining how corticosteroids prevent virus-induced asthma attack.

  7. JUVENILE MYOCLONIC EPILEPSY: A FOCUS ON THE EFFICACY OF THERAPY AND THE RATE OF RELAPSES ACCORDING TO LONG-TERM FOLLOW-UP DATA

    Directory of Open Access Journals (Sweden)

    K. Yu. Mukhin

    2015-01-01

    Full Text Available Juvenile myoclonic epilepsy (JME is a type of adolescent-onset idiopathic generalized epilepsy with the appearance of massive myoclonic seizures and, in most cases, generalized convulsions occurring chiefly in the period after awakening. It is assumed that there is a two-locus (dominant and recessive model of inheritance of JME; moreover, the dominant gene is located on the short arm of chromosome 6. JME is one of the most common types of epilepsy and most frequent among idiopathic generalized epilepsies. Its rate is 5 to 11 % of all types of epilepsy with some female predominance. The diagnosis of JME creates no problems in typical cases. The disease is generally manifested by a concurrence of myoclonic (usually in the hands and generalized clonic-tonic-clonic seizures occurring during waking. Typical absences and epileptic myoclonus of the eyelid are rarer. Seizures are clearly provoked by sleep deprivation. As in other types of idiopathic epilepsy, the patients’ neurological status is normal; no intellectual disabilities are observed. This type of epilepsy is well treatable and, when initial monotherapy is correctly used, sustainable remission occurs immediately in the vast majority (75–85 % of the patients with JME. However, the problem of these patients, unlike that of patients with many forms of idiopathic epilepsy, is that sleep pattern disturbance, missing a dose of antiepileptic drugs (AED, or therapy refusal give rise to relapse of seizures in the vast majority of patients even in long-term remission.Due to the fact that the data available in the literature on the efficacy of therapy in patients with JME and particularly on the results of its discontinuation are contradictory, the authors of the paper conducted an investigation to determine therapeutic effectiveness and the frequency of relapse of seizures in patients with JME during a long-term follow-up.The study enrolled 106 JME patients who had been regularly followed up at

  8. Chronic Obstructive Pulmonary Disease Exacerbations Are Influenced by Gastroesophageal Reflux Disease.

    Science.gov (United States)

    Bigatao, Amilcar M; Herbella, Fernando A M; Del Grande, Leonardo M; Nascimento, Oliver A; Jardim, Jose R; Patti, Marco G

    2018-01-01

    Gastroesophageal reflux disease (GERD) is associated with different pulmonary diseases, including chronic obstructive pulmonary disease (COPD). Whether GERD is contributory to COPD severity remains unclear. This study aims to evaluate the contribution of GERD to the clinical manifestation of COPD based on ventilatory parameters and yearly clinical exacerbations. We studied 48 patients (56% females, age 66 years) with COPD. All patients underwent high-resolution manometry and esophageal pH monitoring. The patients were separated into two groups according to the presence of GERD. GERD was present in 21 (44%) patients. GERD + and GERD - groups did not differ in regard to gender, age, and body mass index. Pulmonary parameters were not different in the absence or presence of GERD. The number of yearly exacerbations was higher in patients GERD+. The severity of GERD (as measured by DeMeester score) correlated with the number of exacerbations. Our results show the following: 1) GERD does not influence pulmonary parameters and 2) GERD is associated with a higher number of annual clinical exacerbations. We believe GERD must be objectively tested in patients with COPD because the prevalence of GERD in these patients is underestimated when only symptoms are considered. GERD treatment might decrease the frequency of episodes of exacerbation.

  9. Clinical characteristics of eosinophilic asthma exacerbations

    DEFF Research Database (Denmark)

    Bjerregaard, Asger; Laing, Ingrid A; Backer, Vibeke

    2017-01-01

    blood cell counts and a screening for common respiratory viruses and bacteria. An eosinophilic exacerbation (EE) was defined as having sputum eosinophils ≥ 3% and a non-eosinophilic exacerbation as NEE). RESULTS: A total of 47 patients were enrolled; 37 (79%) had successful sputum induction...... at baseline, of whom 43% had sputum eosinophils ≥3% (EE). Patients with EE had a significantly lower forced expiratory volume in 1 s (FEV1 ) % predicted (70.8%, P = 0.03) than patients with NEE (83.6%). Furthermore, EE patients were more likely to require supplemental oxygen during admission (63% vs 14%, P...... = 0.002). The prevalence of respiratory viruses was the same in EE and NEE patients (44% vs 52%, P = 0.60), as was bacterial infection (6% vs 14%, P = 0.44). Fractional expiratory nitric oxide (FeNO) correlated with sputum %-eosinophils (ρ = 0.57, P

  10. Withdrawal of inhaled glucocorticoids and exacerbations of COPD

    DEFF Research Database (Denmark)

    Magnussen, Helgo; Disse, Bernd; Rodriguez-Roisin, Roberto

    2014-01-01

    fluticasone propionate (500 μg twice daily) during a 6-week run-in period. Patients were then randomly assigned to continued triple therapy or withdrawal of fluticasone in three steps over a 12-week period. The primary end point was the time to the first moderate or severe COPD exacerbation. Spirometric......-acting bronchodilators has not been fully explored. METHODS: In this 12-month, double-blind, parallel-group study, 2485 patients with a history of exacerbation of COPD received triple therapy consisting of tiotropium (at a dose of 18 μg once daily), salmeterol (50 μg twice daily), and the inhaled glucocorticoid...

  11. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. Exacerbation of pneumomediastinum after air travel in a patient with dermatomyositis.

    Science.gov (United States)

    Ye, Qiuyue; Zhang, Lu; Tian, Xinlun; Shi, Juhong

    2011-07-01

    Although the presence of pneumothorax is generally considered an absolute contraindication to air travel, reports on pneumomediastinum after air travel are extremely rare. Moreover, to the best of our knowledge, exacerbation of existing pneumomediastinum after commercial air travel has never been reported. We report on a case of a patient (the first case that we are aware of) who suffered exacerbation of pneumomediastinum after commercial air travel. This patient, with confirmed pneumomediastinum before air travel, flew to our city for medical care without being warned about exacerbation by the local hospital or airlines. Obvious exacerbation of pneumomediastinum and subcutaneous emphysema was noticed after the travel. Subsequently, a diagnosis of amyopathic dermatomyositis with interstitial lung disease and pneumomediastinum was made. The patient died despite treatment with corticosteroid, cyclophosphamide and intravenous immunoglobulin. This report discusses this rare condition and offers suggestions regarding air travel for patients with presence of pneumomediastinum at the time of flight.

  15. Serum CCL-18 level is a risk factor for COPD exacerbations requiring hospitalization

    Science.gov (United States)

    Dilektasli, Asli Gorek; Demirdogen Cetinoglu, Ezgi; Uzaslan, Esra; Budak, Ferah; Coskun, Funda; Ursavas, Ahmet; Ercan, Ilker; Ege, Ercument

    2017-01-01

    Introduction Chemokine (C-C motif) ligand 18 (CCL-18) has been shown to be elevated in chronic obstructive pulmonary disease (COPD) patients. This study primarily aimed to evaluate whether the serum CCL-18 level differentiates the frequent exacerbator COPD phenotype from infrequent exacerbators. The secondary aim was to investigate whether serum CCL-18 level is a risk factor for exacerbations requiring hospitalization. Materials and methods Clinically stable COPD patients and participants with smoking history but normal spirometry (NSp) were recruited for the study. Modified Medical Research Council Dyspnea Scale, COPD Assessment Test, spirometry, and 6-min walking test were performed. Serum CCL-18 levels were measured with a commercial ELISA Kit. Results Sixty COPD patients and 20 NSp patients were recruited. Serum CCL-18 levels were higher in COPD patients than those in NSp patients (169 vs 94 ng/mL, PCOPD (168 vs 196 ng/mL) subgroups did not achieve statistical significance (P=0.09). Serum CCL-18 levels were significantly higher in COPD patients who had experienced at least one exacerbation during the previous 12 months. Overall, ROC analysis revealed that a serum CCL-18 level of 181.71 ng/mL could differentiate COPD patients with hospitalized exacerbations from those who were not hospitalized with a 88% sensitivity and 88.2% specificity (area under curve: 0.92). Serum CCL-18 level had a strong correlation with the frequency of exacerbations requiring hospitalization (r=0.68, PCOPD, as it is associated with frequency of exacerbations, particularly with severe COPD exacerbations requiring hospitalization, as well as with functional parameters and symptom scores. PMID:28115842

  16. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  17. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  18. Antibiotics for exacerbations of chronic obstructive pulmonary disease.

    Science.gov (United States)

    Vollenweider, Daniela J; Jarrett, Harish; Steurer-Stey, Claudia A; Garcia-Aymerich, Judith; Puhan, Milo A

    2012-12-12

    Many patients with an exacerbation of chronic obstructive pulmonary disease (COPD) are treated with antibiotics. However, the value of antibiotics remains uncertain as systematic reviews and clinical trials have shown conflicting results. To assess the effects of antibiotics in the management of acute COPD exacerbations on treatment failure as observed between seven days and one month after treatment initiation (primary outcome) and on other patient-important outcomes (mortality, adverse events, length of hospital stay). We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE and other electronically available databases up to September 2012. Randomised controlled trials (RCTs) in people with acute COPD exacerbations comparing antibiotic therapy and placebo with a follow-up of at least seven days. Two review authors independently screened references and extracted data from trial reports. We kept the three groups of outpatients, inpatients and patients admitted to the intensive care unit (ICU) separate for benefit outcomes and mortality because we considered them to be clinically too different to be summarised in one group. We considered outpatients to have a mild to moderate exacerbation, inpatients to have a severe exacerbation and ICU patients to have a very severe exacerbation. Where outcomes or study details were not reported we requested missing data from the authors of the primary studies. We calculated pooled risk ratios (RR) for treatment failure, Peto odds ratios (OR) for rare events (mortality and adverse events) and weighted mean differences (MD) for continuous outcomes using fixed-effect models. We used GRADE to assess the quality of the evidence. Sixteen trials with 2068 participants were included. In outpatients (mild to moderate exacerbations), there was evidence of low quality that antibiotics did statistically significantly reduce the risk for treatment failure between seven days and one month after treatment

  19. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. Preventing Severe Asthma Exacerbations in Children. A Randomized Trial of Mite-Impermeable Bedcovers.

    Science.gov (United States)

    Murray, Clare S; Foden, Philip; Sumner, Helen; Shepley, Elizabeth; Custovic, Adnan; Simpson, Angela

    2017-07-15

    Allergen exposure in sensitized individuals with asthma interacts with viruses to increase the risk of asthma exacerbation. To evaluate the use of house dust mite-impermeable bedding and its impact on severe asthma exacerbations in children. We randomized mite-sensitized children with asthma (ages 3-17 yr) after an emergency hospital attendance with an asthma exacerbation to receive mite-impermeable (active group) or control (placebo group) bed encasings. Over a 12-month intervention period, the occurrence of severe asthma exacerbations was investigated. Of 434 children with asthma who consented, 286 (mean age, 7.7 yr; male sex, 65.8%) were mite sensitized, and 284 were randomized (146 to the active group and 138 to the placebo group). At 12 months, significantly fewer children in the active group than in the placebo group had attended the hospital with an exacerbation (36 [29.3%] of 123 vs. 49 [41.5%] of 118; P = 0.047). In the multivariable analysis, the risk of emergency hospital attendance was 45% lower in the active group (hazard ratio, 0.55; 95% confidence interval [CI], 0.36-0.85; P = 0.006) than in the placebo group. The annual rate of emergency hospital attendance with exacerbations was 27% lower in the active group than in the placebo group, but this did not reach significance (estimated marginal mean [95% CI], active, 0.38 [0.26-0.56] vs. placebo, 0.52 [0.35-0.76]; P = 0.18). No difference between the groups in the risk of prednisolone use for exacerbation was found (hazard ratio, 0.82; 95% CI, 0.58-1.17; P = 0.28). Mite-impermeable encasings are effective in reducing the number of mite-sensitized children with asthma attending the hospital with asthma exacerbations but not the number requiring oral prednisolone. This simple measure may reduce the health care burden of asthma exacerbations in children. Clinical trial registered with www.isrctn.com (ISRCTN 69543196).

  2. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  3. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  4. Emotion-induced myoclonic absence-like seizures in a patient with inv-dup(15) syndrome: a clinical, EEG, and molecular genetic study.

    Science.gov (United States)

    Aguglia, U; Le Piane, E; Gambardella, A; Messina, D; Russo, C; Sirchia, S M; Porta, G; Quattrone, A

    1999-09-01

    We have described a clinical EEG and molecular genetic study of a 9-year-old boy with inv-dup(15) syndrome in whom seizures were induced by emotionally gratifying stimuli. The reflex seizures began 5-20 s after the onset of repeated cheek-kissing from his mother or after viewing of pleasant or funny events. They were characterized by bilateral discharges involving mainly the temporal regions and evolving into myoclonic absence-like seizures. Nonemotional stimuli, such as a pinch, sucking or rubbing his cheeks, or the sound of the kiss alone, failed to provoke seizures. The seizures were resistant to antiepileptic (AED) treatments. Molecular genetic investigations revealed a correct methylation pattern of the chromosomes 15, and three copies (two maternal and one paternal) of the segment 15q11-q13, including the GABRb3 gene. We hypothesize that an overexpression of cerebral gamma-aminobutyric acid (GABA)-mediated inhibition accounts for the severe epilepsy that we observed in this patient.

  5. Clinical assessment, staging, and epidemiology of chronic obstructive pulmonary disease exacerbations

    DEFF Research Database (Denmark)

    Vestbo, Jørgen

    2006-01-01

    Patients presenting with an exacerbation of chronic obstructive pulmonary disease (COPD) are initially assessed to ensure that a proper diagnosis has been made and that relevant differential diagnoses are excluded. Although guidelines provide indicators for use, very little systematic research has...... been done in initial assessment of COPD exacerbations. Next, the assessment should aim at stratifying patients for risk of poor outcome. For this, predictors of poor prognosis as well as knowledge of favorable treatments can be used. However, no formal and validated staging system exists today. Given...... the frequency and impact of COPD exacerbations, there seems to be a need for systematic research in this area....

  6. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  7. Pulmonary rehabilitation and severe exacerbations of COPD: solution or white elephant?

    Directory of Open Access Journals (Sweden)

    William D-C. Man

    2015-10-01

    Full Text Available Hospitalisations for severe exacerbations of chronic obstructive pulmonary disease are associated with significant physical and psychological consequences including an increase in symptom severity, severe reductions in physical activity, a deleterious effect on skeletal muscle, impaired exercise tolerance/ability to self-care, decline in quality of life, and increased anxiety and depression. As these consequences are potentially amenable to exercise training, there is a clear rationale for pulmonary rehabilitation in the peri/post-exacerbation setting. Although a 2011 Cochrane review was overwhelmingly positive, subsequent trials have shown less benefit and real-life observational studies have revealed poor acceptability. Qualitative studies have demonstrated that the patient experience is a determining factor while the presence of comorbidities may influence referral, adherence and response to pulmonary rehabilitation. Systematic reviews of less supervised interventions, such as self-management, have shown limited benefits in the post-exacerbation setting. The recent update of the Cochrane review of peri-exacerbation pulmonary rehabilitation showed that benefits were associated with the “comprehensive” nature of the intervention (the number of sessions received, the intensity of exercise training and education delivered, and the degree of supervision but implementation is demanding. The challenge is to develop interventions that are deliverable and acceptable around the time of an acute exacerbation but also deliver the desired clinical impact.

  8. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  9. Tiotropium and Salmeterol in COPD Patients at Risk of Exacerbations: A Post Hoc Analysis from POET-COPD(®).

    Science.gov (United States)

    Vogelmeier, Claus F; Asijee, Guus M; Kupas, Katrin; Beeh, Kai M

    2015-06-01

    Among patients with chronic obstructive pulmonary disease (COPD), the frequency and severity of past exacerbations potentiates future events. The impact of current therapies on exacerbation frequency and severity in patients with different exacerbation risks is not well known. A post hoc analysis of patients at low (≤1 exacerbation [oral steroids/antibiotics requirement] and no COPD-related hospitalization in the year preceding trial entry) or high (≥2 exacerbations [oral steroids/antibiotics requirement] or ≥1 COPD-related hospitalization[s] in the year preceding trial entry) exacerbation risk, from the Prevention of Exacerbations with Tiotropium in Chronic Obstructive Pulmonary Disease (POET-COPD(®)) database. Compared with salmeterol, tiotropium significantly increased time to first COPD exacerbation (hazard ratio 0.84; 95% confidence interval [CI] 0.76-0.92; p = 0.0002) and reduced the number of COPD exacerbations (rate ratio 0.90; 95% CI 0.81-0.99; p = 0.0383) in patients at high exacerbation risk. With treatment, the risk of remaining in the high-risk exacerbator subgroup was statistically lower with tiotropium versus salmeterol (risk ratio [RR] 0.89; 95% CI 0.80-1.00; p = 0.0478). For low-risk patients, time to first COPD exacerbation and number of COPD exacerbations were numerically lower with tiotropium versus salmeterol. With treatment, the risk of transitioning from a low to a high exacerbation risk was lower with tiotropium versus salmeterol (RR 0.87; 95% CI 0.71-1.07; p = 0.1968). This analysis confirms the higher efficacy of tiotropium versus salmeterol in prolonging time to first COPD exacerbation and reducing number of exacerbations in patients both at low and high exacerbation risk. Boehringer Ingelheim and Pfizer. ClinicalTrials.gov NCT00563381.

  10. Inverse relationship between nonadherence to original GOLD treatment guidelines and exacerbations of COPD.

    Science.gov (United States)

    Foda, Hussein D; Brehm, Anthony; Goldsteen, Karen; Edelman, Norman H

    2017-01-01

    Prescriber disagreement is among the reasons for poor adherence to COPD treatment guidelines; it is yet not clear whether this leads to adverse outcomes. We tested whether undertreatment according to the original Global Initiative for Chronic Obstructive Lung Disease (GOLD) guidelines led to increased exacerbations. Records of 878 patients with spirometrically confirmed COPD who were followed from 2005 to 2010 at one Veterans Administration (VA) Medical Center were analyzed. Analysis of variance was performed to assess differences in exacerbation rates between severity groups. Logistic regression analysis was performed to assess the relationship between noncompliance with guidelines and exacerbation rates. About 19% were appropriately treated by guidelines; 14% overtreated, 44% under-treated, and in 23% treatment did not follow any guideline. Logistic regression revealed a strong inverse relationship between undertreatment and exacerbation rate when severity of obstruction was held constant. Exacerbations per year by GOLD stage were significantly different from each other: mild 0.15, moderate 0.27, severe 0.38, very severe 0.72, and substantially fewer than previously reported. The guidelines were largely not followed. Undertreatment predominated but, contrary to expectations, was associated with fewer exacerbations. Thus, clinicians were likely advancing therapy primarily based upon exacerbation rates as was subsequently recommended in revised GOLD and other more recent guidelines. In retrospect, a substantial lack of prescriber adherence to treatment guidelines may have been a signal that they required re-evaluation. This is likely to be a general principle regarding therapeutic guidelines. The identification of fewer exacerbations in this cohort than has been generally reported probably reflects the comprehensive nature of the VA system, which is more likely to identify relatively asymptomatic (ie, nonexacerbating) COPD patients. Accordingly, these rates may

  11. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  12. Early investigational antibiotics for the treatment of acute exacerbations of chronic bronchitis.

    Science.gov (United States)

    Falagas, Matthew E; Georgiou, Maria

    2017-03-01

    Acute exacerbations in patients with chronic bronchitis are a leading cause of hospitalizations and death. Bacteria contribute significantly to such exacerbations. The aim of this review was to explore the potential role of investigational antibiotics in the treatment of these episodes. Areas covered: The available literature in PubMed database, in websites related to investigational drugs and in websites of the producing companies has been searched. The in vitro activity against pathogens involved in acute exacerbations of chronic bronchitis and the pharmacokinetic profile of antibiotics currently under development were taken into consideration for inclusion in the review. Expert opinion: Several novel antimicrobial agents have completed preclinical and Phase I studies and were well-tolerated. Further investigation is mandatory in order to evaluate their future in treatment of chronic bronchitis exacerbations and discover potential advantages compared to already approved antimicrobials.

  13. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  14. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  15. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  17. Plasma sCD14 as a biomarker to predict pulmonary exacerbations in cystic fibrosis.

    Directory of Open Access Journals (Sweden)

    Bradley S Quon

    Full Text Available BACKGROUND: One in four cystic fibrosis (CF patients diagnosed with a pulmonary exacerbation will not recover their baseline lung function despite standard treatment. This highlights the importance of preventing such events. Clinical decision-making can be improved through a simple blood test that predicts individuals at elevated short-term risk of an exacerbation. METHODS: We obtained plasma samples from 30 stable CF patients from the St. Paul's Hospital Adult CF Clinic (Vancouver, Canada. For 15 patients, an additional plasma sample was obtained during an exacerbation. Soluble CD14 (sCD14 and C-reactive protein (CRP were quantified using ELISA kits. Myeloperoxidase (MPO, interleukin(IL-6, IL-1β, monocyte chemoattractant protein-1 (MCP-1, vascular endothelial growth factor (VEGF, and granulocyte colony-stimulating factor (G-CSF were quantified using Luminex™ immunoassays. Stable state biomarker levels were examined in their ability to predict individuals that would experience a pulmonary exacerbation requiring intravenous (IV antibiotics within 4 months. Paired stable and exacerbation plasma biomarker levels were also compared. RESULTS: sCD14 levels were significantly higher in patients that experienced a pulmonary exacerbation requiring IV antibiotics within 4 months (p = 0.001. sCD14 cut-off value of 1450 ng/mL was associated with an area under the curve of 0.91 (95% CI 0.83-0.99 for predicting an exacerbation within 4 months of a stable visit, with a sensitivity of 100% and specificity of 82%. Plasma sCD14 levels were significantly higher during exacerbations than during periods of clinical stability (p = 0.03. CONCLUSIONS: Plasma sCD14 is a promising biomarker for identifying CF patients who will exacerbate within 4 months of a stable visit but requires further study in larger, independent cohorts.

  18. Provocative and inhibitory effects of a video-EEG neuropsychologic protocol in juvenile myoclonic epilepsy.

    Science.gov (United States)

    Guaranha, Mirian Salvadori Bittar; da Silva Sousa, Patrícia; de Araújo-Filho, Gerardo Maria; Lin, Katia; Guilhoto, Laura Maria Figueiredo Ferreira; Caboclo, Luís Otávio Sales Ferreira; Yacubian, Elza Márcia Targas

    2009-11-01

    Studies suggest that higher cognitive functions could precipitate seizures in juvenile myoclonic epilepsy (JME). The present study aimed to analyze the effects of higher mental activity on epileptiform discharges and seizures in patients with JME and compare them to those of habitual methods of activation. Seventy-six patients with JME (41 female) underwent a video-EEG (electroencephalography) neuropsychologic protocol (VNPP) and habitual methods of activation for 4-6 h. Twenty-nine of the 76 (38.2%) presented provocative effect, and inhibition was seen in 28 of 31 (90.3%). A mixed effect was observed in 11 (35.5%), and 30 patients (39.5%) suffered no effect of VNPP. Action-programming tasks were more effective than thinking in provoking epileptiform discharges (23.7% and 11.0% of patients, respectively, p = 0.03). Inhibitory effect was observed equally in the various categories of tasks, except in mental calculation, which had a higher inhibitory rate. Habitual methods of activation were more effective than VNPP in provoking discharges. Anxiety disorders were diagnosed in 24 of 58 patients (41.4%); anxious patients had greater discharge indexes and no significant inhibitory effect on VNPP. Praxis exerted the most remarkable provocative effect, in accordance with the motor circuitry hyperexcitability hypothesis in JME. Inhibitory effect, which had no such task specificity, might be mediated by a widespread cortical-thalamic pathway, possibly involving the parietal cortex. The frequent inhibitory effect found under cortical activation conditions, influenced by the presence of anxiety, supports nonpharmacologic therapeutic interventions in JME.

  19. Proximity to Industrial Food Animal Production and Asthma Exacerbations in Pennsylvania, 2005-2012.

    Science.gov (United States)

    Rasmussen, Sara G; Casey, Joan A; Bandeen-Roche, Karen; Schwartz, Brian S

    2017-03-31

    The research on industrial food animal production (IFAP) and asthma exacerbations in the United States has relied on small sample sizes and/or self-reported outcomes. We assessed associations of proximity to large-scale and densely stocked swine and dairy/veal IFAP with three types of asthma exacerbations: hospitalizations, emergency encounters, and oral corticosteroid (OCS) medication orders from Geisinger Clinic in Pennsylvania. We used a diagnosis code ( International Classification of Diseases, 9th Revision, Clinical Modification code 493.x) and medication orders from electronic health records to identify these exacerbations among asthma patients ( n = 35,269) from 2005-2012. We compared residential proximity to swine or dairy/veal IFAP (dichotomized as <3 miles (4.8 km) or ≥3 miles) among asthma patients with and without exacerbations and estimated odds ratios using multilevel logistic regression. In adjusted models, proximity to IFAP was associated (odds ratio (95% confidence interval)) with OCS orders (1.11 (1.04-1.19)) and hospitalizations (1.29 (1.15-1.46)), but not emergency encounters (1.12 (0.91-1.37)). This study contributes to growing evidence that IFAP may impact health, in this case clinically-documented asthma exacerbations. No prior study has evaluated the association of IFAP and clinically-documented asthma exacerbations in the United States.

  20. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  1. Subtypes of Patients Experiencing Exacerbations of COPD and Associations with Outcomes

    Science.gov (United States)

    Arostegui, Inmaculada; Esteban, Cristobal; García-Gutierrez, Susana; Bare, Marisa; Fernández-de-Larrea, Nerea; Briones, Eduardo; Quintana, José M.

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is a complex and heterogeneous condition characterized by occasional exacerbations. Identifying clinical subtypes among patients experiencing COPD exacerbations (ECOPD) could help better understand the pathophysiologic mechanisms involved in exacerbations, establish different strategies of treatment, and improve the process of care and patient prognosis. The objective of this study was to identify subtypes of ECOPD patients attending emergency departments using clinical variables and to validate the results using several outcomes. We evaluated data collected as part of the IRYSS-COPD prospective cohort study conducted in 16 hospitals in Spain. Variables collected from ECOPD patients attending one of the emergency departments included arterial blood gases, presence of comorbidities, previous COPD treatment, baseline severity of COPD, and previous hospitalizations for ECOPD. Patient subtypes were identified by combining results from multiple correspondence analysis and cluster analysis. Results were validated using key outcomes of ECOPD evolution. Four ECOPD subtypes were identified based on the severity of the current exacerbation and general health status (largely a function of comorbidities): subtype A (n = 934), neither high comorbidity nor severe exacerbation; subtype B (n = 682), moderate comorbidities; subtype C (n = 562), severe comorbidities related to mortality; and subtype D (n = 309), very severe process of exacerbation, significantly related to mortality and admission to an intensive care unit. Subtype D experienced the highest rate of mortality, admission to an intensive care unit and need for noninvasive mechanical ventilation, followed by subtype C. Subtypes A and B were primarily related to other serious complications. Hospitalization rate was more than 50% for all the subtypes, although significantly higher for subtypes C and D than for subtypes A and B. These results could help identify

  2. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  3. Predictive factors for moderate or severe exacerbations in asthma patients receiving outpatient care

    OpenAIRE

    Guti?rrez, Francisco Javier ?lvarez; Galv?n, Marta Ferrer; Gallardo, Juan Francisco Medina; Mancera, Marta Barrera; Romero, Beatriz Romero; Falc?n, Auxiliadora Romero

    2017-01-01

    Background Asthma exacerbations are important events that affect disease control, but predictive factors for severe or moderate exacerbations are not known. The objective was to study the predictive factors for moderate (ME) and severe (SE) exacerbations in asthma patients receiving outpatient care. Methods Patients aged?>?12?years with asthma were included in the study and followed-up at 4-monthly intervals over a 12-month period. Clinical (severity, level of control, asthma control test [AC...

  4. Prediction and course of symptoms and lung function around an exacerbation in chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    van den Berge Maarten

    2012-06-01

    Full Text Available Abstract Background Frequent exacerbations induce a high burden to Chronic Obstructive Pulmonary Disease (COPD. We investigated the course of exacerbations in the published COSMIC study that investigated the effects of 1-year withdrawal of fluticasone after a 3-month run-in treatment period with salmeterol/fluticasone in patients with COPD. Methods In 373 patients, we evaluated diary cards for symptoms, Peak Expiratory Flow (PEF, and salbutamol use and assessed their course during exacerbations. Results There were 492 exacerbations in 224 patients. The level of symptoms of cough, sputum, dyspnea and nocturnal awakening steadily increased from 2 weeks prior to exacerbation, with a sharp rise during the last week. Symptoms of cough, sputum, and dyspnea reverted to baseline values at different rates (after 4, 4, and 7 weeks respectively, whereas symptoms of nocturnal awakening were still increased after eight weeks. The course of symptoms was similar around a first and second exacerbation. Increases in symptoms and salbutamol use and decreases in PEF were associated with a higher risk to develop an exacerbation, but with moderate predictive values, the areas under the receiver operating curves ranging from 0.63 to 0.70. Conclusions Exacerbations of COPD are associated with increased symptoms that persist for weeks and the course is very similar between a first and second exacerbation. COPD exacerbations are preceded by increased symptoms and salbutamol use and lower PEF, yet predictive values are too low to warrant daily use in clinical practice.

  5. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  6. Severe myoclonic epilepsy of infancy (Dravet syndrome: Clinical and genetic features of nine Turkish patients

    Directory of Open Access Journals (Sweden)

    Meral Özmen

    2011-01-01

    Full Text Available Purpose: Mutations of the a-1 subunit sodium channel gene (SCN1A cause severe myoclonic epilepsy of infancy (SMEI. To date, over 300 mutations related to SMEI have been described. In the present study, we report new SCN1A mutations and the clinical features of SMEI cases. Materials and Methods: We studied the clinical and genetic features of nine patients diagnosed with SMEI at the Pediatric Neurology Department of Istanbul Medical Faculty. Results: Five patients had nonsense mutations, two had missense mutations, one had a splice site mutation and one had a deletion mutation of the SCN1A gene. Mutations at c.3705+5G splice site, p.trip153X nonsense mutation and deletion at c.2416_2946 have not been previously described. The seizures started following whole cell pertussis vaccination in all patients. The seizures ceased in one patient and continued in the other eight patients. Developmental regression was severe in three patients, with frequent status epilepticus. The type of mutation was not predictive for the severity of the disease. Two of the three patients with severe regression had nonsense and missense mutations. Conclusions : Dravet syndrome can be result of several different types of mutation in SCN1A gene. Onset of the seizures after pertussis vaccination is an important clue for the diagnosis and neuro- developmental delay should be expected in all patients.

  7. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  10. Oxygen therapy in acute exacerbations of chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Ringbaek, T.; Lange, P.; Mogensen, T.

    2008-01-01

    Acute exacerbation of COPD is a major cause of hospitalisation in Denmark. Most of the patients require supplemental oxygen in the acute phase and some patients continue oxygen therapy at home after discharge. In this paper we discuss the physiological mechanisms of respiratory failure seen...... in acute exacerbations of COPD. The principles for oxygen therapy in the acute phase are described and recommendations for oxygen therapy are suggested Udgivelsesdato: 2008/5/5...

  11. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  12. Altered gene expression in blood and sputum in COPD frequent exacerbators in the ECLIPSE cohort.

    Directory of Open Access Journals (Sweden)

    Dave Singh

    Full Text Available Patients with chronic obstructive pulmonary disease (COPD who are defined as frequent exacerbators suffer with 2 or more exacerbations every year. The molecular mechanisms responsible for this phenotype are poorly understood. We investigated gene expression profile patterns associated with frequent exacerbations in sputum and blood cells in a well-characterised cohort. Samples from subjects from the ECLIPSE COPD cohort were used; sputum and blood samples from 138 subjects were used for microarray gene expression analysis, while blood samples from 438 subjects were used for polymerase chain reaction (PCR testing. Using microarray, 150 genes were differentially expressed in blood (>±1.5 fold change, p≤0.01 between frequent compared to non-exacerbators. In sputum cells, only 6 genes were differentially expressed. The differentially regulated genes in blood included downregulation of those involved in lymphocyte signalling and upregulation of pro-apoptotic signalling genes. Multivariate analysis of the microarray data followed by confirmatory PCR analysis identified 3 genes that predicted frequent exacerbations; B3GNT, LAF4 and ARHGEF10. The sensitivity and specificity of these 3 genes to predict the frequent exacerbator phenotype was 88% and 33% respectively. There are alterations in systemic immune function associated with frequent exacerbations; down-regulation of lymphocyte function and a shift towards pro-apoptosis mechanisms are apparent in patients with frequent exacerbations.

  13. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Particularities of COPD exacerbations in different phenotypes of the disease in Tunisia.

    Science.gov (United States)

    Zendah, Ines; Ayed, Khadija; Kwas, Hamida; Khattab, Amel; Ghédira, Habib

    2016-03-01

    Chronic Obstructive Pulmonary Disease is defined by a limitation of airflow. This disease is characterized by exacerbations that threaten the patient's life and worsens his prognosis. Moreover, COPD patients are different according to many parameters that define different phenotypes. Characteristics of exacerbations may depend on these phenotypes according to few recent studies. To determine the characteristics and the prognosis of the exacerbations in each phenotype of COPD patients phenotype in Tunisia. Retrospective study including 153 male patients hospitalized for COPD exacerbation from January 2009 to June 2012. Patients were classified into 4 phenotypes according to Burgel's classification. Patients were divided into four phenotypes: phenotype (PH)1: (n=68), PH2: (n=33), PH3: (n=25) and PH4: (n=27). Mean age for PH1, 2, 3 and 4 was: 61, 74, 56 and 72 years. The number of exacerbations per year was higher in PH1. Dyspnea was more important in PH1 and 4. Hypercapnia on admission was higher in PH4. Non invasive ventilation and transfer to resuscitation unit were more frequently mandatory in PH3 and 4.   Death occurred 2% of PH1 and 5% of PH4. Hospitalization duration was more important in PH4. COPD patients are heterogenous and belong to different phenotypes. The characteristics of the exacerbations and their prognosis widely differ according to these different groups. In Tunisia, it seems that patients who had moderate respiratory functional tests impairment are the lowest responders to treatment with a higher frequency of resuscitation unit transfer.

  18. The frequency of asthma exacerbations and healthcare utilization in patients with asthma from the UK and USA.

    Science.gov (United States)

    Suruki, Robert Y; Daugherty, Jonas B; Boudiaf, Nada; Albers, Frank C

    2017-04-27

    Asthma exacerbations are frequent in patients with severe disease. This report describes results from two retrospective cohort studies describing exacerbation frequency and risk, emergency department (ED)/hospital re-admissions, and asthma-related costs by asthma severity in the US and UK. Patients with asthma in the US-based Clinformatics™ DataMart Multiplan IMPACT (2010-2011; WEUSKOP7048) and the UK-based Clinical Practice Research Datalink (2009-2011; WEUSKOP7092) databases were categorized by disease severity (Global Initiative for Asthma [GINA]; Step and exacerbation history) during the 12 months pre-asthma medical code (index date). Outcomes included: frequency of exacerbations (asthma-related ED visit, hospitalization, or oral corticosteroid use with an asthma medical code recorded within ±2 weeks) 12 months post-index, asthma-related ED visits/hospitalization, and asthma-related costs 30 days post-index. Risk of a subsequent exacerbation was determined by proportional hazard model. Of the 222,817 and 211,807 patients with asthma included from the US and UK databases, respectively, 12.5 and 8.4% experienced ≥1 exacerbation during the follow-up period. Exacerbation frequency increased with disease severity. Among the 5,167 and 2,904 patients with an asthma-related ED visit/hospitalization in the US and UK databases, respectively, 9.2 and 4.7% had asthma-related re-admissions within 30 days. Asthma-related re-admission rates and costs increased with disease severity, approximately doubling between GINA Step 1 and 5 and in patients with ≥2 versus <2 exacerbations in the previous year. Risk of a subsequent exacerbation increased 32-35% for an exacerbation requiring ED visit/hospitalization versus oral corticosteroids. Increased disease severity was associated with higher exacerbation frequency, ED/hospitalization re-admission, costs and risk of subsequent exacerbation, indicating that these patients require high-intensity post-exacerbation management.

  19. Low-intensity noninvasive ventilation: Lower pressure, more exacerbations of chronic respiratory failure

    Directory of Open Access Journals (Sweden)

    Toru Kadowaki

    2016-01-01

    Conclusions: Attention should be paid to CRF patients who are initially administered LI-NPPV; they should be carefully observed because they can develop more exacerbations of CRF than patients undergoing C-NPPV. If possible, higher initial PS should be administered to prevent CRF exacerbations.

  20. Definitions of Exacerbations Does It Really Matter in Clinical Trials on COPD?

    NARCIS (Netherlands)

    Effing, Tanja W.; Kerstjens, Huib A. M.; Monninkhof, Evelyn M.; van der Valk, Paul D. L. P. M.; Wouters, Emiel F. M.; Postma, Dirkje S.; Zielhuis, Gerhard A.; van der Palen, Job

    Many definitions of COPD exacerbations are reported. The choice for a definition determines the number of exacerbations observed. However, the effect of different definitions on the effect sizes of randomized controlled trials is unclear. This article provides an overview of the large variation of

  1. Definitions of exacerbations: does it really matter in clinical trials on COPD?

    NARCIS (Netherlands)

    Effing-Tijdhof, T.W.; Kerstjens, H.A.; Monninkhof, E.M.; Valk, P.D.L.P.M. van der; Wouters, E.F.; Postma, D.S.; Zielhuis, G.A.; Palen, J.A.M. van der

    2009-01-01

    Many definitions of COPD exacerbations are reported. The choice for a definition determines the number of exacerbations observed. However, the effect of different definitions on the effect sizes of randomized controlled trials is unclear. This article provides an overview of the large variation of

  2. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  3. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  4. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  5. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  6. High salt intake does not exacerbate murine autoimmune thyroiditis

    Science.gov (United States)

    Kolypetri, P; Randell, E; Van Vliet, B N; Carayanniotis, G

    2014-01-01

    Recent studies have shown that high salt (HS) intake exacerbates experimental autoimmune encephalomyelitis and have raised the possibility that a HS diet may comprise a risk factor for autoimmune diseases in general. In this report, we have examined whether a HS diet regimen could exacerbate murine autoimmune thyroiditis, including spontaneous autoimmune thyroiditis (SAT) in non-obese diabetic (NOD.H2h4) mice, experimental autoimmune thyroiditis (EAT) in C57BL/6J mice challenged with thyroglobulin (Tg) and EAT in CBA/J mice challenged with the Tg peptide (2549–2560). The physiological impact of HS intake was confirmed by enhanced water consumption and suppressed aldosterone levels in all strains. However, the HS treatment failed to significantly affect the incidence and severity of SAT or EAT or Tg-specific immunoglobulin (Ig)G levels, relative to control mice maintained on a normal salt diet. In three experimental models, these data demonstrate that HS intake does not exacerbate autoimmune thyroiditis, indicating that a HS diet is not a risk factor for all autoimmune diseases. PMID:24528002

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  9. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  10. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  12. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  13. Defining moderate asthma exacerbations in clinical trials based on ATS/ERS joint statement

    DEFF Research Database (Denmark)

    Virchow, J Christian; Backer, Vibeke; de Blay, Frédéric

    2015-01-01

    from baseline on at least 2 consecutive mornings/evenings or ≥20% decrease in FEV1 from baseline and/or d) visit to the emergency room/trial site for asthma treatment not requiring systemic corticosteroids. CONCLUSION: A clinically and patient-relevant, operational definition of moderate exacerbations......BACKGROUND: Exacerbations are a key outcome in clinical research, providing patient-relevant information about symptomatic control, health state and disease progression. Generally considered as an episode of (sub)acute deterioration of respiratory symptoms, a precise, clinically useful definition...... is needed for use in clinical trials. AIM AND METHODS: Focussing on moderate exacerbations, this opinion piece reviews landmark trials and current guidelines to provide a practical definition of a moderate exacerbation. Specifically, we adapt the ATS/ERS consensus statement of terminology Reddel et al...

  14. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  15. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  16. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  17. Case-fatality of COPD exacerbations: a meta-analysis and statistical modeling approach

    DEFF Research Database (Denmark)

    Hoogendoorn, M; Hoogenveen, R T; Rutten-van Mölken, M P

    2010-01-01

    's survival curve was divided into a critical and a stable period. Mortality during the stable period was then estimated by extrapolating the survival curve during the stable period back to the time of exacerbation onset. Case-fatality was defined as the excess mortality that results from an exacerbation...

  18. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  19. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  20. Effect of budesonide/formoterol pressurized metered-dose inhaler on exacerbations versus formoterol in chronic obstructive pulmonary disease: The 6-month, randomized RISE (Revealing the Impact of Symbicort in reducing Exacerbations in COPD) study.

    Science.gov (United States)

    Ferguson, Gary T; Tashkin, Donald P; Skärby, Tor; Jorup, Carin; Sandin, Kristina; Greenwood, Michael; Pemberton, Kristine; Trudo, Frank

    2017-11-01

    Prevention of exacerbations is a primary goal for chronic obstructive pulmonary disease (COPD) therapy. This randomized, double-blind, double-dummy, parallel-group, multicenter study evaluated the effect of budesonide/formoterol pressurized metered-dose inhaler (pMDI) versus formoterol dry powder inhaler (DPI) on reducing COPD exacerbations. 1219 patients aged ≥40 years with moderate-to-very-severe COPD (per lung function) and a history of ≥1 COPD exacerbation received budesonide/formoterol pMDI 320/9 μg twice daily (BID) during a 4-week run-in. Patients were then randomized 1:1 to receive budesonide/formoterol pMDI 320/9 μg BID (n = 606) or formoterol DPI 9 μg BID (n = 613) for 26 weeks. Exacerbations were identified using predefined criteria for symptom worsening and treatment with systemic corticosteroids and/or antibiotics and/or hospitalization. The primary endpoint was annual rate of exacerbations. Budesonide/formoterol pMDI resulted in a 24% reduction in annual rate of exacerbations (0.85 vs 1.12; rate ratio: 0.76 [95% CI: 0.62, 0.92]; P = 0.006), and a significant risk reduction for time to first exacerbation (hazard ratio: 0.78 [95% CI: 0.64, 0.96]; P = 0.016) versus formoterol DPI. The most commonly reported adverse events (AEs; ≥3%) in budesonide/formoterol and formoterol groups were COPD (4.5% vs 8.6%) and nasopharyngitis (5.0% vs 5.2%). Pneumonia AEs were reported in 0.5% and 1.0% of budesonide/formoterol-treated and formoterol-treated patients, respectively. Budesonide/formoterol pMDI is an effective treatment option for reducing exacerbation rates in COPD patients with moderate-to-very-severe airflow limitation and history of exacerbations. No increase in pneumonia was observed with budesonide/formoterol; safety data were consistent with its established profile. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  1. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  2. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  3. MARGINAL IODINE DEFICIENCY EXACERBATES PERCHLORATE THYROID TOXICITY.

    Science.gov (United States)

    The environmental contaminant perchlorate disrupts thyroid homeostasis via inhibition of iodine uptake into the thyroid. This work tested whether iodine deficiency exacerbates the effects of perchlorate. Female 27 day-old LE rats were fed a custom iodine deficient diet with 0, 50...

  4. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  5. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  6. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  7. Use of the Asthma Control Questionnaire to predict future risk of asthma exacerbation.

    Science.gov (United States)

    Meltzer, Eli O; Busse, William W; Wenzel, Sally E; Belozeroff, Vasily; Weng, Haoling H; Feng, JingYuan; Chon, Yun; Chiou, Chiun-Fang; Globe, Denise; Lin, Shao-Lee

    2011-01-01

    Direct correlation of assessments of a validated composite measure such as the Asthma Control Questionnaire (ACQ) and risk of exacerbation has not been previously demonstrated in a randomized controlled trial. To evaluate the ability of the ACQ score over time to predict risk of a future asthma exacerbation. This analysis included data from a 12-week placebo-controlled trial (N = 292) of AMG 317, an IL-4 receptor α antagonist, in patients with moderate to severe atopic asthma. At baseline, patients had an ACQ score ≥1.5. Exacerbations were defined as requirement for systemic corticosteroids. A Cox proportional hazards model was used, with ACQ score as the time-dependent covariate. The analysis was repeated for individual components of the ACQ. Each 1-point increase in ACQ was associated with a 50% increased risk of exacerbation (hazard ratio, 1.50; 95% CI, 1.03-2.20) for the following 2-week period. Evaluation of individual ACQ components also demonstrated a similar trend, though each to a lesser degree than the full composite ACQ. Although based on a retrospective analysis, with small number of exacerbations, these findings support the utility of the composite ACQ score measurement to predict risk of future exacerbation in clinical trials and clinical practice. The composite ACQ score measurement was found to be a better predictor of future risk than individual ACQ components. Copyright © 2010 American Academy of Allergy, Asthma & Immunology. Published by Mosby, Inc. All rights reserved.

  8. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  9. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  10. Gastro-esophageal reflux disease and exacerbations in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Ingebrigtsen, Truls S; Marott, Jacob L; Vestbo, Jørgen

    2015-01-01

    BACKGROUND AND OBJECTIVE: We tested the hypothesis that gastro-esophageal reflux disease is a risk factor for exacerbations in individuals with chronic obstructive pulmonary disease (COPD). METHODS: Among 9622 participants in the Copenhagen City Heart Study, we identified 1259 individuals with COPD...... applied a multivariable Cox regression analysis with adjustment for well-established risk factors associated with COPD exacerbations or gastro-esophageal reflux disease, including COPD severity, and symptoms. RESULTS: Individuals with COPD and gastro-esophageal reflux disease had more chronic bronchitis...... and information on gastro-esophageal reflux disease and the regular use of acid inhibitory treatment. These individuals were followed for 5 years with regard to medically treated COPD exacerbations, which we defined as a short course treatment with oral corticosteroids alone or in combination with antibiotics. We...

  11. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  12. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  13. Day-to-day measurement of patient-reported outcomes in exacerbations of chronic obstructive pulmonary disease

    Science.gov (United States)

    Kocks, Jan Willem H; van den Berg, Jan Willem K; Kerstjens, Huib AM; Uil, Steven M; Vonk, Judith M; de Jong, Ynze P; Tsiligianni, Ioanna G; van der Molen, Thys

    2013-01-01

    Background Exacerbations of chronic obstructive pulmonary disease (COPD) are a major burden to patients and to society. Little is known about the possible role of day-to-day patient-reported outcomes during an exacerbation. This study aims to describe the day-to-day course of patient-reported health status during exacerbations of COPD and to assess its value in predicting clinical outcomes. Methods Data from two randomized controlled COPD exacerbation trials (n = 210 and n = 45 patients) were used to describe both the feasibility of daily collection of and the day-to-day course of patient-reported outcomes during outpatient treatment or admission to hospital. In addition to clinical parameters, the BORG dyspnea score, the Clinical COPD Questionnaire (CCQ), and the St George’s Respiratory Questionnaire were used in Cox regression models to predict treatment failure, time to next exacerbation, and mortality in the hospital study. Results All patient-reported outcomes showed a distinct pattern of improvement. In the multivariate models, absence of improvement in CCQ symptom score and impaired lung function were independent predictors of treatment failure. Health status and gender predicted time to next exacerbation. Five-year mortality was predicted by age, forced expiratory flow in one second % predicted, smoking status, and CCQ score. In outpatient management of exacerbations, health status was found to be less impaired than in hospitalized patients, while the rate and pattern of recovery was remarkably similar. Conclusion Daily health status measurements were found to predict treatment failure, which could help decision-making for patients hospitalized due to an exacerbation of COPD. PMID:23766644

  14. Haemophilus influenzae from Patients with Chronic Obstructive Pulmonary Disease Exacerbation Induce More Inflammation than Colonizers

    Science.gov (United States)

    Chin, Cecilia L.; Manzel, Lori J.; Lehman, Erin E.; Humlicek, Alicia L.; Shi, Lei; Starner, Timothy D.; Denning, Gerene M.; Murphy, Timothy F.; Sethi, Sanjay; Look, Dwight C.

    2005-01-01

    Rationale: Airway infection with Haemophilus influenzae causes airway inflammation, and isolation of new strains of this bacteria is associated with increased risk of exacerbations in patients with chronic obstructive pulmonary disease (COPD). Objective: To determine whether strains of H. influenzae associated with exacerbations cause more inflammation than strains that colonize the airways of patients with COPD. Methods: Exacerbation strains of H. influenzae were isolated from patients during exacerbation of clinical symptoms with subsequent development of a homologous serum antibody response and were compared with colonization strains that were not associated with symptom worsening or an antibody response. Bacterial strains were compared using an in vivo mouse model of airway infection and in vitro cell culture model of bacterial adherence and defense gene and signaling pathway activation in primary human airway epithelial cells. Results: H. influenzae associated with exacerbations caused more airway neutrophil recruitment compared with colonization strains in the mouse model of airway bacterial infection. Furthermore, exacerbation strains adhered to epithelial cells in significantly higher numbers and induced more interleukin-8 release after interaction with airway epithelial cells. This effect was likely mediated by increased activation of the nuclear factor-κB and p38 mitogen-activated protein kinase signaling pathways. Conclusions: The results indicate that H. influenzae strains isolated from patients during COPD exacerbations often induce more airway inflammation and likely have differences in virulence compared with colonizing strains. These findings support the concept that bacteria infecting the airway during COPD exacerbations mediate increased airway inflammation and contribute to decreased airway function. PMID:15805181

  15. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  16. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  17. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  18. Proton spectroscopy of the thalamus in a homogeneous sample of patients with easy-to-control juvenile myoclonic epilepsy

    Energy Technology Data Exchange (ETDEWEB)

    Leite, Claudia da Costa; Valente, Kette Dualibi Ramos; Fiore, Lia Arno; Otaduy, Maria Concepcion Garcia, E-mail: claudia.leite@hc.fm.usp.br [Universidade de Sao Paulo (FM/USP), Sao Paulo, SP (Brazil). Faculdade de Medicina

    2017-09-15

    Objective: Juvenile myoclonic epilepsy (JME) is a subtype of genetically determined generalized epilepsy that does not present abnormalities on conventional magnetic resonance imaging. The aim of this study was to identify metabolic alterations in the thalamus in a clinically homogeneous sample of patients with easy-to-control JME, using short-echo time proton magnetic resonance spectroscopy (MRS). Materials and Methods: We performed single-voxel (2 cm × 2 cm × 2 cm), short-echo time (TE = 35 ms) proton MRS of the thalamus in 21 patients with JME and in 14 healthy age-matched controls. We quantified N-acetylaspartate (NAA), total NAA, creatine (Cr), choline, and myo-inositol (MI), as well as the sum of glutamate and glutamine signals, all scaled to internal water content, and we calculated metabolite ratios using Cr as a reference. Values of p < 0.05 were considered significant. Results: The MI level and the MI/Cr ratio were significantly lower in the thalami of patients diagnosed with JME than in those of the controls. Other metabolites and their ratios did not differ significantly between the two groups. Conclusion: In our sample of 21 JME patients, we identified lower levels of MI in the thalamus. No significant abnormalities were observed in the concentrations or ratios of other metabolites. (author)

  19. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  20. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  2. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  3. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  4. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  5. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  6. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  7. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  8. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  9. Sputum microbiome temporal variability and dysbiosis in chronic obstructive pulmonary disease exacerbations: an analysis of the COPDMAP study.

    Science.gov (United States)

    Wang, Zhang; Singh, Richa; Miller, Bruce E; Tal-Singer, Ruth; Van Horn, Stephanie; Tomsho, Lynn; Mackay, Alexander; Allinson, James P; Webb, Adam J; Brookes, Anthony J; George, Leena M; Barker, Bethan; Kolsum, Umme; Donnelly, Louise E; Belchamber, Kylie; Barnes, Peter J; Singh, Dave; Brightling, Christopher E; Donaldson, Gavin C; Wedzicha, Jadwiga A; Brown, James R

    2018-04-01

    Recent studies suggest that lung microbiome dysbiosis, the disease associated disruption of the lung microbial community, might play a key role in chronic obstructive pulmonary disease (COPD) exacerbations. However, characterising temporal variability of the microbiome from large longitudinal COPD cohorts is needed to better understand this phenomenon. We performed a 16S ribosomal RNA survey of microbiome on 716 sputum samples collected longitudinally at baseline and exacerbations from 281 subjects with COPD at three UK clinical centres as part of the COPDMAP consortium. The microbiome composition was similar among centres and between stable and exacerbations except for a small significant decrease of Veillonella at exacerbations. The abundance of Moraxella was negatively associated with bacterial alpha diversity. Microbiomes were distinct between exacerbations associated with bacteria versus eosinophilic airway inflammation. Dysbiosis at exacerbations, measured as significant within subject deviation of microbial composition relative to baseline, was present in 41% of exacerbations. Dysbiosis was associated with increased exacerbation severity indicated by a greater fall in forced expiratory volume in one second, forced vital capacity and a greater increase in CAT score, particularly in exacerbations with concurrent eosinophilic inflammation. There was a significant difference of temporal variability of microbial alpha and beta diversity among centres. The variation of beta diversity significantly decreased in those subjects with frequent historical exacerbations. Microbial dysbiosis is a feature of some exacerbations and its presence, especially in concert with eosinophilic inflammation, is associated with more severe exacerbations indicated by a greater fall in lung function. Results, NCT01620645. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless

  10. Are personality traits of juvenile myoclonic epilepsy related to frontal lobe dysfunctions? A proton MRS study.

    Science.gov (United States)

    de Araújo Filho, Gerardo Maria; Lin, Katia; Lin, Jaime; Peruchi, Mirella M; Caboclo, Luís Otávio S F; Guaranha, Mirian S B; Guilhoto, Laura M F F; Carrete, Henrique; Yacubian, Elza Márcia T

    2009-05-01

    Personality traits characterized by emotional instability and immaturity, unsteadiness, lack of discipline, hedonism, frequent and rapid mood changes, and indifference toward one's disease have been associated with patients who have juvenile myoclonic epilepsy (JME). Literature data demonstrate worse seizure control and more psychosocial dysfunctions among patients with JME who have those traits. In this controlled study we performed a correlation analysis of psychiatric scores with magnetic resonance spectroscopy (MRS) values across JME patients, aiming to verify the existence of a possible relation between frontal lobe dysfunction and the prevalence of personality disorders (PDs) in JME. Sixteen JME patients with cluster B PDs, 41 JME patients without any psychiatric disorder, and 30 healthy controls were submitted to a psychiatric evaluation and to a quantitative multivoxel MRS of thalamus; insula; cingulate gyrus; striatum; and frontal, parietal, and occipital lobes. Groups were homogeneous according to age, gender, and manual dominance. Psychiatric evaluation was performed through the Scheduled Clinical Interview for DSM-IV, Axis I and II (SCID I and II, respectively). A significant reduction of N-acetyl-aspartate over creatinine (NAA/Cr) ratio was observed mainly in the left frontal lobe in the JME and PD group. In addition, a significant increase in the glutamate-glutamine over creatinine GLX/Cr ratio was also observed in this referred region in the same group. These data support the hypothesis that PDs in JME could represent neuronal dysfunction and possibly a more severe form of this epileptic syndrome.

  11. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  12. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  13. The role of human rhinovirus (HRV) species on asthma exacerbation severity in children and adolescents.

    Science.gov (United States)

    Lambert, Katrina A; Prendergast, Luke A; Dharmage, Shyamali C; Tang, Mimi; O'Sullivan, Molly; Tran, Thomas; Druce, Julian; Bardin, Philip; Abramson, Michael J; Erbas, Bircan

    2017-10-11

    It is recognized that human rhinovirus (HRV) infection is an important factor in asthma exacerbations requiring hospitalization in children. However, previous studies have disagreed on the differential impact of various HRV species. We sought to assess the impact of HRV species on the severity of asthma exacerbations in children and adolescents. We also examined whether the effect of HRV species on severity was modified by age and gender. Virus strain was determined for 113 children with HRV detectable at the time of admission for asthma exacerbation. Patient characteristics were collected on admission and exacerbation severity was scored using several validated scales. HRV species by itself was not associated with moderate/severe vs. mild exacerbations. Boys with HRV-C infections were more likely (OR: 3.7, 95% CI: 1.2-13.4) to have a moderate/severe exacerbation than girls with HRV-C (p = 0.04 for interaction term). Higher odds were observed in younger boys (3 years old: OR: 9.1, 95% CI: 1.8-47.1 vs 5 years old: OR: 3.3, 95% CI: 0.9-11.8 vs 7 years old: OR: 1.2, 95% CI: 0.2-6.6). In contrast, children with HRV-C infection and sensitized to pollen during the pollen season were less likely to have moderate/severe exacerbations (p = 0.01 for the interaction term). Acute asthma exacerbations are more likely to be moderate/severe in boys under 5 years of age who had HRV-C infection on admission. The opposite was found in children with sensitization to pollen during pollen season.

  14. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  15. Can resistive breathing injure the lung? Implications for COPD exacerbations

    Directory of Open Access Journals (Sweden)

    Vassilakopoulos T

    2016-09-01

    Full Text Available Theodoros Vassilakopoulos, Dimitrios Toumpanakis Pulmonary and Critical Care Medicine, Medical School, National and Kapodistrian University of Athens, Greece Abstract: In obstructive lung diseases, airway inflammation leads to bronchospasm and thus resistive breathing, especially during exacerbations. This commentary discusses experimental evidence that resistive breathing per se (the mechanical stimulus in the absence of underlying airway inflammation leads to lung injury and inflammation (mechanotransduction. The potential implications of resistive breathing-induced mechanotrasduction in COPD exacerbations are presented along with the available clinical evidence. Keywords: resistive breathing, COPD, mechanotransduction, bronchoconstriction, inflammation

  16. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  17. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  18. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  19. Pulmonary Exacerbation Score in Cystlc Fibrosis Patients: Reliability and Validity Testing

    OpenAIRE

    Keller, F.

    2016-01-01

    Background: Lung disease in cystic fibrosis (CF) is characterized by recurrent pulmonary exacerbations (PEs), but consensus on diagnostic criteria for PE is lacking. The use of a consistent definition of PE as an outcome measure in CF clinical trials would allow meaningful comparison across centers. The aim of this study was to assess the reliability and validity of a simplified version of the Seattle Pulmonary Exacerbation Score (SPEX). Materials and Methods: A cross-sectional observational ...

  20. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  1. Inverse relationship between nonadherence to original GOLD treatment guidelines and exacerbations of COPD

    Directory of Open Access Journals (Sweden)

    Foda HD

    2017-01-01

    Full Text Available Hussein D Foda,1,2 Anthony Brehm,1,2 Karen Goldsteen,3 Norman H Edelman2,4 1Division of Pulmonary Critical Care and Sleep Medicine, Department of Medicine, Veterans Affairs Medical Center, Northport, 2Division of Pulmonary Critical Care and Sleep Medicine, Department of Medicine, Stony Brook University Medical Center, Stony Brook, NY, 3MPH Program, University of North Dakota School of Medicine and Health Sciences, Grand Forks, ND, 4Department of Preventative Medicine and Program in Public Health, Stony Brook University Medical Center, Stony Brook, NY, USA Background: Prescriber disagreement is among the reasons for poor adherence to COPD treatment guidelines; it is yet not clear whether this leads to adverse outcomes. We tested whether undertreatment according to the original Global Initiative for Chronic Obstructive Lung Disease (GOLD guidelines led to increased exacerbations.Methods: Records of 878 patients with spirometrically confirmed COPD who were followed from 2005 to 2010 at one Veterans Administration (VA Medical Center were analyzed. Analysis of variance was performed to assess differences in exacerbation rates between severity groups. Logistic regression analysis was performed to assess the relationship between noncompliance with guidelines and exacerbation rates.Findings: About 19% were appropriately treated by guidelines; 14% overtreated, 44% undertreated, and in 23% treatment did not follow any guideline. Logistic regression revealed a strong inverse relationship between undertreatment and exacerbation rate when severity of obstruction was held constant. Exacerbations per year by GOLD stage were significantly different from each other: mild 0.15, moderate 0.27, severe 0.38, very severe 0.72, and substantially fewer than previously reported.Interpretation: The guidelines were largely not followed. Undertreatment predominated but, contrary to expectations, was associated with fewer exacerbations. Thus, clinicians were likely

  2. Efficacy of a self-management plan in exacerbations for patients with advanced COPD

    Directory of Open Access Journals (Sweden)

    Sánchez-Nieto JM

    2016-08-01

    Full Text Available Juan Miguel Sánchez-Nieto,1,2 Rubén Andújar-Espinosa,3 Roberto Bernabeu-Mora,1,2 Chunshao Hu,1 Beatriz Gálvez-Martínez,1 Andrés Carrillo-Alcaraz,1 Carlos Federico Álvarez-Miranda,3 Olga Meca-Birlanga,1 Eva Abad-Corpa4 1Division of Pneumology, Hospital Morales Meseguer, 2University of Murcia, 3Division of Pneumology, Hospital Arrixaca, Murcia, 4Department of Professional Development Unit, Murcia, Spain Background: Self-management interventions improve different outcome variables in various chronic diseases. Their role in COPD has not been clearly established. We assessed the efficacy of an intervention called the self-management program on the need for hospital care due to disease exacerbation in patients with advanced COPD.Methods: Multicenter, randomized study in two hospitals with follow-up of 1 year. All the patients had severe or very severe COPD, and had gone to either an accident and emergency (A&E department or had been admitted to a hospital at least once in the previous year due to exacerbation of COPD. The intervention consisted of a group education session on the main characteristics of the disease, an individual training session on inhalation techniques, at the start and during the 3rd month, and a written action plan containing instructions for physical activity and treatment for stable phases and exacerbations. We determined the combined number of COPD-related hospitalizations and emergency visits per patient per year. Secondary endpoints were number of patients with visits to A&E and the number of patients hospitalized because of exacerbations, use of antibiotics and corticosteroids, length of hospital stay, and all-cause mortality.Results: After 1 year, the rate of COPD exacerbations with visits to A&E or hospitalization had decreased from 1.37 to 0.89 (P=0.04 and the number of exacerbations dropped from 52 to 42 in the group of patients who received the intervention. The numbers of patients hospitalized, at 19 (40

  3. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  4. Antibiotics for bronchiectasis exacerbations in children: rationale and study protocol for a randomised placebo-controlled trial

    Directory of Open Access Journals (Sweden)

    Chang Anne B

    2012-08-01

    Full Text Available Abstract Background Despite bronchiectasis being increasingly recognised as an important cause of chronic respiratory morbidity in both indigenous and non-indigenous settings globally, high quality evidence to inform management is scarce. It is assumed that antibiotics are efficacious for all bronchiectasis exacerbations, but not all practitioners agree. Inadequately treated exacerbations may risk lung function deterioration. Our study tests the hypothesis that both oral azithromycin and amoxicillin-clavulanic acid are superior to placebo at improving resolution rates of respiratory exacerbations by day 14 in children with bronchiectasis unrelated to cystic fibrosis. Methods We are conducting a bronchiectasis exacerbation study (BEST, which is a multicentre, randomised, double-blind, double-dummy, placebo-controlled, parallel group trial, in five centres (Brisbane, Perth, Darwin, Melbourne, Auckland. In the component of BEST presented here, 189 children fulfilling inclusion criteria are randomised (allocation-concealed to receive amoxicillin-clavulanic acid (22.5 mg/kg twice daily with placebo-azithromycin; azithromycin (5 mg/kg daily with placebo-amoxicillin-clavulanic acid; or placebo-azithromycin with placebo-amoxicillin-clavulanic acid for 14 days. Clinical data and a paediatric cough-specific quality of life score are obtained at baseline, at the start and resolution of exacerbations, and at day 14. In most children, blood and deep nasal swabs are also collected at the same time points. The primary outcome is the proportion of children whose exacerbations have resolved at day 14. The main secondary outcome is the paediatric cough-specific quality of life score. Other outcomes are time to next exacerbation; requirement for hospitalisation; duration of exacerbation; and spirometry data. Descriptive viral and bacteriological data from nasal samples and blood markers will also be reported. Discussion Effective, evidence-based management

  5. COPD exacerbations associated with the modified Medical Research Council scale and COPD assessment test among Humana Medicare members

    Directory of Open Access Journals (Sweden)

    Pasquale MK

    2016-01-01

    Full Text Available Margaret K Pasquale,1 Yihua Xu,1 Christine L Baker,2 Kelly H Zou,3 John G Teeter,4 Andrew M Renda,5 Cralen C Davis,1 Theodore C Lee,6 Joel Bobula2 1Comprehensive Health Insights, Inc., Humana Inc., Louisville, KY, 2Outcomes and Evidence, Global Health & Value, Pfizer Inc., 3Statistical Center for Outcomes, Real-World and Aggregate Data, Global Innovative Pharma Business, Pfizer Inc., New York, NY, 4Global Medical Development, Global Innovative Pharma Business, Pfizer Inc., Groton, CT, 5Retail Strategy & Execution, Humana Inc., Louisville, KY, 6Global Medical Affairs, Global Innovative Pharma Business, Pfizer Inc., New York, NY, USA Background: The Global initiative for chronic Obstructive Lung Disease guidelines recommend assessment of COPD severity, which includes symptomatology using the modified Medical Research Council (mMRC or COPD assessment test (CAT score in addition to the degree of airflow obstruction and exacerbation history. While there is great interest in incorporating symptomatology, little is known about how patient reported symptoms are associated with future exacerbations and exacerbation-related costs.Methods: The mMRC and CAT were mailed to a randomly selected sample of 4,000 Medicare members aged >40 years, diagnosed with COPD (≥2 encounters with International Classification of Dis­eases-9th Edition Clinical Modification: 491.xx, 492.xx, 496.xx, ≥30 days apart. The exacerbations and exacerbation-related costs were collected from claims data during 365-day post-survey after exclusion of members lost to follow-up or with cancer, organ transplant, or pregnancy. A logistic regression model estimated the predictive value of exacerbation history and symptomatology on exacerbations during follow-up, and a generalized linear model with log link and gamma distribution estimated the predictive value of exacerbation history and symptomatology on exacerbation-related costs.Results: Among a total of 1,159 members who returned the

  6. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  7. Predicting high risk of exacerbations in bronchiectasis: the E-FACED score

    Directory of Open Access Journals (Sweden)

    Martinez-Garcia MA

    2017-01-01

    Full Text Available Martinez-Garcia MA,1,2 Athanazio RA,3 Girón R,4 Máiz-Carro L,5 de la Rosa D,6 Olveira C,7 de Gracia J,2,8 Vendrell M,9 Prados-Sánchez C,10 Gramblicka G,11 Corso Pereira M,12 Lundgren FL,13 Fernandes De Figueiredo M,14 Arancibia F,15 Rached SZ3 1Pulmonary Service, Polytechnic and University La Fe Hospital, Valencia, Spain; 2CIBERes, CIBER de Enfermedades Respiratorias. Madrid. Spain; 3Pulmonary Division, Heart Institute (Incor, Hospital das Clínicas da Faculdade de Medicina da Universidade de São Paulo; 4Pneumology Service, Hospital La Princesa, 5Pneumology Service, Hospital Ramón y Cajal, Madrid, 6Pneumology Unit, Hospital Plató, Barcelona, 7Pneumology, Málaga Regional University Hospital, Instituto de Biomedicina de Málaga (IBIMA, Málaga University, Spain; 8Pneumology Service, Hospital Vall d’Hebron, Barcelona, 9Bronchiectasis Group IDIBGI, Dr. Trueta University Hospital. UdG. Ciberes CB06/06/0030, 10Unidad de Fibrosis Quística y Bronquiectasias. Hospital Universitario La Paz. Madrid. Spain; 11Pneumology Service, Hospital del Tórax Dr A Cetrángolo, Buenos Aires, Argentina; 12Pneumology Service, Universidade Estadual de Campinas UNICAMP, Sao Paulo, 13Pneumology Service, Hospital Octávio de Freitas, Recife, 14Pneumology Service, Hospital de Messejana, Fortaleza, Brazil; 15Pneumology Service, Instituto Nacional del Tórax, Santiago de Chile, Chile Background: Although the FACED score has demonstrated a great prognostic capacity in bronchiectasis, it does not include the number or severity of exacerbations as a separate variable, which is important in the natural history of these patients.Objective: Construction and external validation of a new index, the E-FACED, to evaluate the predictive capacity of exacerbations and mortality.Methods: The new score was constructed on the basis of the complete cohort for the construction of the original FACED score, while the external validation was undertaken with six cohorts from three

  8. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  9. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  10. A trial of beclomethasone/formoterol in COPD using EXACT-PRO to measure exacerbations

    DEFF Research Database (Denmark)

    Singh, Dave; Kampschulte, Jorg; Wedzicha, Jadwiga A

    2013-01-01

    -primary outcome, and the Exacerbations of Chronic Pulmonary Disease Tool (EXACT) means of collecting patient-reported outcome data are also being used to enhance the detection of exacerbation events. EXACT data are being collected using a novel application of a digital platform technology. FORWARD is therefore...

  11. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  12. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  13. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  14. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  17. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  18. Effects of puberty on cystic fibrosis related pulmonary exacerbations in women versus men.

    Science.gov (United States)

    Sutton, Shelby; Rosenbluth, Daniel; Raghavan, Deepa; Zheng, Jie; Jain, Raksha

    2014-01-01

    Epidemiologic data from studies of airway diseases, such as asthma, chronic obstructive pulmonary disease, and cystic fibrosis indicate a gender disparity where women have worse outcomes. The explanation for this is largely unknown. We hypothesize that female sex hormones play a role in this gender disparity, predisposing women to more exacerbations and decreased lung function post-puberty. In Cystic Fibrosis, to determine if puberty marks a point of increasing exacerbations and decreasing lung function in women relative to men. Using the United States Cystic Fibrosis Foundation Patient Registry, we used linear regression to compare lung function and rate of pulmonary exacerbations in men versus women before and after puberty. Of 5,137 subjects who met inclusion criteria, 2,689 were male and 2,448 were female. Average age of puberty was found to be 13.2 ± 2.2 years in men and 11.2 ± 2.0 years of age in women. Percent predicted FEV1 pre- and post-puberty were no different between males versus females (P = 0.44 pre-puberty and P = 0.16 post-puberty). In contrast, women had a significantly higher rate of pulmonary exacerbations post-puberty than men (1.17 ± 1.35 exacerbations per year in women versus 0.95 ± 1.27 in men; P puberty, the rate of pulmonary exacerbations increased in adolescent women relative to men with cystic fibrosis, supporting a role for sex hormones in the disease process. Further understanding of the mechanisms that modulate sex hormone receptors in airway disease may serve as future targets for therapy. © 2013 Wiley Periodicals, Inc.

  19. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  20. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  1. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  2. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  3. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  4. Pulmonary exacerbation in adults with bronchiectasis: a consensus definition for clinical research.

    Science.gov (United States)

    Hill, Adam T; Haworth, Charles S; Aliberti, Stefano; Barker, Alan; Blasi, Francesco; Boersma, Wim; Chalmers, James D; De Soyza, Anthony; Dimakou, Katerina; Elborn, J Stuart; Feldman, Charles; Flume, Patrick; Goeminne, Pieter C; Loebinger, Michael R; Menendez, Rosario; Morgan, Lucy; Murris, Marlene; Polverino, Eva; Quittner, Alexandra; Ringshausen, Felix C; Tino, Gregory; Torres, Antoni; Vendrell, Montserrat; Welte, Tobias; Wilson, Rob; Wong, Conroy; O'Donnell, Anne; Aksamit, Timothy

    2017-06-01

    There is a need for a clear definition of exacerbations used in clinical trials in patients with bronchiectasis. An expert conference was convened to develop a consensus definition of an exacerbation for use in clinical research.A systematic review of exacerbation definitions used in clinical trials from January 2000 until December 2015 and involving adults with bronchiectasis was conducted. A Delphi process followed by a round-table meeting involving bronchiectasis experts was organised to reach a consensus definition. These experts came from Europe (representing the European Multicentre Bronchiectasis Research Collaboration), North America (representing the US Bronchiectasis Research Registry/COPD Foundation), Australasia and South Africa.The definition was unanimously approved by the working group as: a person with bronchiectasis with a deterioration in three or more of the following key symptoms for at least 48 h: cough; sputum volume and/or consistency; sputum purulence; breathlessness and/or exercise tolerance; fatigue and/or malaise; haemoptysis AND a clinician determines that a change in bronchiectasis treatment is required.The working group proposes the use of this consensus-based definition for bronchiectasis exacerbation in future clinical research involving adults with bronchiectasis. Copyright ©ERS 2017.

  5. Determining the diagnostic value of endogenous carbon monoxide in Chronic Obstructive Pulmonary Disease exacerbations

    International Nuclear Information System (INIS)

    Dogan, N. O.; Corbacioglu, S. K.; Bildik, F.; Kilicaslan, I.; Hakoglu, O.; Gunaydin, G. P.; Cevik, Y.; Ulker, V.; Gokcen, E.

    2014-01-01

    Objective: To determine whether endogenous carbon monoxide levels in exacerbations of Chronic Obstructive Pulmonary Disease patients were higher compared to healthy individuals and to investigate alteration of carbon monoxide levels across the three different severity stages of Global Initiative for Chronic Obstructive Lung Disease criteria related to Chronic Obstructive Pulmonary Disease exacerbations. Methods: The prospective study was conducted from January to March 2011 at two medical institutions in Ankara, Turkey, and comprised patients of acute Chronic Obstructive Pulmonary Disease exacerbations. The severity of the exacerbations was based on the Global Initiative for Chronic Obstructive Lung Disease criteria. Patients with active tobacco smoking, suspicious carbon monoxide poisoning and uncertain diagnosis were excluded. healthy control subjects who did not have any comorbid diseases and smoking habitus were also enrolled to compare the differences between carboxyhaemoglobin levels A two-tailed Mann-Whitney U test with Bonferroni correction was done following a Kruskal-Wallis test for statistical purposes. Results: There were 90 patients and 81 controls in the study. Carboxyhaemoglobin levels were higher in the patients than the controls (p<0.001). As for the three severity stages, Group 1 had a median carboxyhaemoglobin of 1.6 (0.95-2.00). The corresponding levels in Group 2 (1.8 (1.38-2.20)) and Group 3 (1.9 (1.5-3.0)) were higher than the controls (p<0.001 and p<0.005 respectively). No statistically significant difference between Group 1 and the controls (1.30 (1.10-1.55)) was observed (p<0.434). Conclusion: Carboxyhaemoglobin levels were significantly higher in exacerbations compared with the normal population. Also, in more serious exacerbations, carboxyhaemoglobin levels were significantly increased compared with healthy individuals and mild exacerbations. (author)

  6. Can a school-based hand hygiene program reduce asthma exacerbations among elementary school children?

    Science.gov (United States)

    Gerald, Joe K.; Zhang, Bin; McClure, Leslie A.; Bailey, William C.; Harrington, Kathy F.

    2012-01-01

    Background Viral upper respiratory infections have been implicated as a major cause of asthma exacerbations among school age children. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections but, effective hand washing practices are difficult to establish in schools. Objectives This randomized controlled trial evaluated whether a standardized regimen of hand washing plus alcohol-based hand sanitizer could reduce asthma exacerbations more than schools’ usual hand hygiene practices. Methods This was a two year, community-based, randomized controlled crossover trial. Schools were randomized to usual care then intervention (Sequence 1) or intervention then usual care (Sequence 2). Intervention schools were provided with alcohol-based hand sanitizer, hand soap, and hand hygiene education. The primary outcome was the proportion of students experiencing an asthma exacerbation each month. Generalized estimating equations were used to model the difference in the marginal rate of exacerbations between sequences while controlling for individual demographic factors and the correlation within each student and between students within each school. Results 527 students with asthma were enrolled among 31 schools. The hand hygiene intervention did not reduce the number of asthma exacerbations as compared to the schools’ usual hand hygiene practices (p=0.132). There was a strong temporal trend as both sequences experienced fewer exacerbations during Year 2 as compared to Year 1 (phand hygiene behaviors and resources in usual care schools. Therefore, these results should be viewed cautiously. PMID:23069487

  7. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  8. Comparison of COPD Assessment Test and Clinical COPD Questionnaire to predict the risk of exacerbation

    Directory of Open Access Journals (Sweden)

    Jo YS

    2017-12-01

    Full Text Available Yong Suk Jo,1 Ho Il Yoon,2 Deog Kyeom Kim,3 Chul-Gyu Yoo,1 Chang-Hoon Lee1 1Division of Pulmonary and Critical Care Medicine, Department of Internal Medicine, Seoul National University Hospital, Seoul, 2Division of Pulmonary and Critical Care Medicine, Department of Internal Medicine, Seoul National University Bundang Hospital, Seongnam, Gyeonggi, 3Division of Pulmonary and Critical Care Medicine, Department of Internal Medicine, Seoul Metropolitan Government-Seoul National University Boramae Medical Center, Seoul, Republic of Korea Background and objective: Guidelines recommend the use of simple but comprehensive tools such as COPD Assessment Test (CAT and Clinical COPD Questionnaire (CCQ to assess health status in COPD patients. We aimed to compare the ability of CAT and CCQ to predict exacerbation in COPD patients. Methods: We organized a multicenter prospective cohort study that included COPD patients. The relationships between CAT, CCQ, and other clinical measurements were analyzed by correlation analysis, and the impact of CAT and CCQ scores on exacerbation was analyzed by logistic regression analyses and receiver operating characteristic curve. Results: Among 121 COPD patients, CAT and CCQ score correlated with other symptom measures, lung function and exercise capacity as well. Compared with patients who did not experience exacerbation, those who experienced exacerbation (n=45; 38.2% exhibited more severe airflow limitation, were more likely to have a history of exacerbation in the year prior to enrollment, and demonstrated higher CAT scores. CCQ scores were not significantly associated with exacerbations. A CAT score of ≥15 was an independent risk factor for exacerbation (adjusted odds ratio [aOR], 2.40; 95% CI, 1.03–6.50; P=0.04. Furthermore, CAT scores of ≥15 demonstrated an increased predictive ability for exacerbation compared with currently accepted guidelines for the use of CAT (≥10 and CCQ (≥1 in the assessment of COPD

  9. Viruses and bacteria in acute asthma exacerbations - A GA(2) LEN-DARE* systematic review

    DEFF Research Database (Denmark)

    Papadopoulos, N G; Christodoulou, I; Rohde, G

    2011-01-01

    and sensitive methodologies. This systematic review summarizes current knowledge and developments in infection epidemiology of acute asthma in children and adults, describing the known impact for each individual agent and highlighting knowledge gaps. Among infectious agents, human rhinoviruses are the most...... and bacteria in acute asthma exacerbations - A GA(2) LEN-DARE systematic review. Allergy 2010; DOI: 10.1111/j.1398-9995.2010.02505.x. ABSTRACT: A major part of the burden of asthma is caused by acute exacerbations. Exacerbations have been strongly and consistently associated with respiratory infections...

  10. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  11. The association of lung function and St. George's respiratory questionnaire with exacerbations in COPD: a systematic literature review and regression analysis.

    Science.gov (United States)

    Martin, Amber L; Marvel, Jessica; Fahrbach, Kyle; Cadarette, Sarah M; Wilcox, Teresa K; Donohue, James F

    2016-04-16

    This study investigated the relationship between changes in lung function (as measured by forced expiratory volume in one second [FEV1]) and the St. George's Respiratory Questionnaire (SGRQ) and economically significant outcomes of exacerbations and health resource utilization, with an aim to provide insight into whether the effects of COPD treatment on lung function and health status relate to a reduced risk for exacerbations. A systematic literature review was conducted in MEDLINE, Embase, and the Cochrane Central Register of Controlled Trials to identify randomized controlled trials of adult COPD patients published in English since 2002 in order to relate mean change in FEV1 and SGRQ total score to exacerbations and hospitalizations. These predictor/outcome pairs were analyzed using sample-size weighted regression analyses, which estimated a regression slope relating the two treatment effects, as well as a confidence interval and a test of statistical significance. Sixty-seven trials were included in the analysis. Significant relationships were seen between: FEV1 and any exacerbation (time to first exacerbation or patients with at least one exacerbation, p = 0.001); between FEV1 and moderate-to-severe exacerbations (time to first exacerbation, patients with at least one exacerbation, or annualized rate, p = 0.045); between SGRQ score and any exacerbation (time to first exacerbation or patients with at least one exacerbation, p = 0.0002) and between SGRQ score and moderate-to-severe exacerbations (time to first exacerbation or patients with at least one exacerbation, p = 0.0279; annualized rate, p = 0.0024). Relationships between FEV1 or SGRQ score and annualized exacerbation rate for any exacerbation or hospitalized exacerbations were not significant. The regression analysis demonstrated a significant association between improvements in FEV1 and SGRQ score and lower risk for COPD exacerbations. Even in cases of non-significant relationships

  12. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  13. Psychological Factors and Pain Exacerbation in Knee Osteoarthritis : A Web Based Case-Crossover Study

    NARCIS (Netherlands)

    Erfani, Tahereh; Keefe, Francis; Bennell, Kim; Chen, J; Makovey, J; Metcalf, B; Williams, A.D.; Zhang, Y; Hunter, David

    2015-01-01

    OBJECTIVES: The pain experienced by osteoarthritis (OA) patients is neither constant nor unchanging and patients experience episodes of pain exacerbations. Using an innovative web based case-crossover design, we evaluated whether psychological factors are risk factors for pain exacerbations in

  14. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  15. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  16. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  17. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  18. Age-Specific Characteristics of Inpatients with Severe Asthma Exacerbation

    Directory of Open Access Journals (Sweden)

    Kiyoshi Sekiya

    2013-01-01

    Conclusions: The characteristics of inpatients with severe asthma vary depending on age. We need to establish countermeasures for asthma exacerbation according to the characteristics of patients depending on age.

  19. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  1. Do frequent moderate exacerbations contribute to progression of chronic obstructive pulmonary disease in patients who are ex-smokers?

    Directory of Open Access Journals (Sweden)

    Dreyse J

    2015-03-01

    Full Text Available Jorge Dreyse,1 Orlando Díaz,1 Paula Repetto,2 Arturo Morales,1 Fernando Saldías,1 Carmen Lisboa11Department of Pulmonary Diseases, School of Medicine, 2School of Psychology, Pontificia Universidad Católica de Chile, Santiago, ChileBackground: In addition to smoking, acute exacerbations are considered to be a contributing factor to progression of chronic obstructive pulmonary disease (COPD. However, these findings come from studies including active smokers, while results in ex-smokers are scarce and contradictory. The purpose of this study was to evaluate if frequent acute moderate exacerbations are associated with an accelerated decline in forced expiratory volume in one second (FEV1 and impairment of functional and clinical outcomes in ex-smoking COPD patients.Methods: A cohort of 100 ex-smoking patients recruited for a 2-year follow-up study was evaluated at inclusion and at 6-monthly scheduled visits while in a stable condition. Evaluation included anthropometry, spirometry, inspiratory capacity, peripheral capillary oxygen saturation, severity of dyspnea, a 6-minute walking test, BODE (Body mass index, airflow Obstruction, Dyspnea, Exercise performance index, and quality of life (St George’s Respiratory Questionnaire and Chronic Respiratory Disease Questionnaire. Severity of exacerbation was graded as moderate or severe according to health care utilization. Patients were classified as infrequent exacerbators if they had no or one acute exacerbation/year and frequent exacerbators if they had two or more acute exacerbations/year. Random effects modeling, within hierarchical linear modeling, was used for analysis.Results: During follow-up, 419 (96% moderate acute exacerbations were registered. At baseline, frequent exacerbators had more severe disease than infrequent exacerbators according to their FEV1 and BODE index, and also showed greater impairment in inspiratory capacity, forced vital capacity, peripheral capillary oxygen saturation

  2. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  3. Relapsing-Remitting MS (RRMS)

    Medline Plus

    Full Text Available ... defined attacks of new or increasing neurologic symptoms. These attacks – also called relapses or exacerbations – are followed ... as well as the nerve fibers themselves. During these inflammatory attacks, activated immune cells cause small, localized ...

  4. Characteristics associated with clinical severity and inflammatory phenotype of naturally occurring virus-induced exacerbations of asthma in adults

    DEFF Research Database (Denmark)

    Bjerregaard, Asger; Laing, Ingrid A; Poulsen, Nadia

    2017-01-01

    BACKGROUND: In experimental studies viral infections have been shown to induce type 2 inflammation in asthmatics, but whether this is a feature of naturally occurring virus-induced asthma exacerbations is unknown. Thymic stromal lymphopoietin (TSLP) released from the airway epithelium in response...... occurring virus-induced exacerbations of asthma and whether TSLP is associated with this type 2 inflammation. METHODS: Patients presenting to hospital with acute asthma were examined during the exacerbation, and after 4 weeks recovery. The assessments included spirometry, FeNO and induced sputum...... in patients during virus-induced asthma exacerbations, to the same degree as non-viral exacerbations, and correlate negatively with FEV1. However, in virus-positive patients, high TSLP expression during exacerbation was associated with low sputum eosinophils, suggesting that the effect of TSLP in vivo...

  5. Management and prevention of chronic obstructive pulmonary disease exacerbations: a state of the art review

    Directory of Open Access Journals (Sweden)

    Wedzicha Jadwiga A

    2009-08-01

    Full Text Available Abstract Exacerbations of chronic obstructive pulmonary disease (COPD are important events in the natural history of this prevalent and devastating condition. This review provides a concise, state of the art summary on prevention and management of exacerbations. Considerable new data underpins evidence in support of many preventative interventions, pharmacological and non-pharmacological, that are now available. Challenges remain in developing new approaches, and delivering those that already exist to the right patient at the right time. Management of an exacerbation remains stepwise according to clinical severity, but there is now additional focus on addressing comorbidities and taking the opportunity at acute events to optimise preventative strategies for the future. Ultimately, exacerbations are heterogeneous events in a heterogeneous disease, and an individualised approach is paramount.

  6. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  7. Static and dynamic hyperinflation during severe acute exacerbations of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    van Geffen WH

    2018-04-01

    Full Text Available Wouter H van Geffen,1,2 Huib AM Kerstjens2 1Department of Respiratory Medicine, Medical Centre Leeuwarden, Leeuwarden, the Netherlands; 2Department of Pulmonary Diseases, University of Groningen, University Medical Center Groningen, Groningen, the Netherlands Background: Static hyperinflation is known to be increased during moderate acute exacerbations of chronic obstructive pulmonary disease (COPD (AECOPD, but few data exist in patients with severe exacerbations of COPD. The role of dynamic hyperinflation during exacerbations is unclear. Methods: In a prospective, observational cohort study, we recruited patients admitted to hospital for AECOPD. The following measurements were performed upon admission and again after resolution (stable state at least 42 days later: inspiratory capacity (IC, body plethysmography, dynamic hyperinflation by metronome-paced IC measurement, health-related quality of life and dyspnea. Results: Forty COPD patients were included of whom 28 attended follow-up. The IC was low at admission (2.05±0.11 L and increased again during resolution by 15.6%±23.1% or 0.28±0.08 L (mean ± standard error of the mean, p<0.01. Testing of metronome-paced changes in IC was feasible, and it decreased by 0.74±0.06 L at admission, similarly to at stable state. Clinical COPD Questionnaire score was 3.7±0.2 at admission and improved by 1.7±0.2 points (p<0.01, and the Borg dyspnea score improved by 2.2±0.5 points from 4.4±0.4 at admission (p<0.01. Conclusion: Static hyperinflation is increased during severe AECOPD requiring hospitalization compared with stable state. We could measure metronome-paced dynamic hyperinflation during severe AECOPD but found no increase. Keywords: COPD, exacerbations of COPD, static hyperinflation, dynamic hyperinflation, severe acute exacerbations of COPD, COPD exacerbation, chronic obstructive pulmonary disease

  8. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  9. Fine particulate pollution and asthma exacerbations.

    Science.gov (United States)

    Bouazza, Naïm; Foissac, Frantz; Urien, Saik; Guedj, Romain; Carbajal, Ricardo; Tréluyer, Jean-Marc; Chappuy, Hélène

    2017-12-19

    As the results from epidemiological studies about the impact of outdoor air pollution on asthma in children are heterogeneous, our objective was to investigate the association between asthma exacerbation in children and exposure to air pollutants. A database of 1 264 585 paediatric visits during the 2010-2015 period to the emergency rooms from 20 emergency departments (EDs) of 'Assistance Publique Hôpitaux de Paris (APHP)', the largest hospital group in Europe, was used. A total of 47 107 visits were classified as asthma exacerbations. Concentration of air pollutants (nitrogen dioxide, ozone, fine particulate matter (PM) with an aerodynamic diameter smaller than 10  µm (PM 10 ) and 2.5 µm (PM 2.5 )), as well as meteorological data, evolution of respiratory syncytial virus infection and pollen exposition, were collected on an hourly or daily basis for the same period using institutional databases. To assess the association between air pollution and asthma, mixed-effects quasi-Poisson regression modelling was performed. The only compound independently associated with ED visits for asthma was PM 2.5 (Ppollutants. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. Risk factors for acute exacerbations of COPD in a primary care population: a retrospective observational cohort study

    Science.gov (United States)

    Müllerová, Hana; Shukla, Amit; Hawkins, Adam; Quint, Jennifer

    2014-01-01

    Objectives To evaluate risk factors associated with exacerbation frequency in primary care. Information on exacerbations of chronic obstructive pulmonary disease (COPD) has mainly been generated by secondary care-based clinical cohorts. Design Retrospective observational cohort study. Setting Electronic medical records database (England and Wales). Participants 58 589 patients with COPD aged ≥40 years with COPD diagnosis recorded between 1 April 2009 and 30 September 2012, and with at least 365 days of follow-up before and after the COPD diagnosis, were identified in the Clinical Practice Research Datalink. Mean age: 69 years; 47% female; mean forced expiratory volume in 1s 60% predicted. Outcome measures Data on moderate or severe exacerbation episodes defined by diagnosis and/or medication codes 12 months following cohort entry were retrieved, together with demographic and clinical characteristics. Associations between patient characteristics and odds of having none versus one, none versus frequent (≥2) and one versus frequent exacerbations over 12 months follow-up were evaluated using multivariate logistic regression models. Results During follow-up, 23% of patients had evidence of frequent moderate-to-severe COPD exacerbations (24% one; 53% none). Independent predictors of increased odds of having exacerbations during the follow-up, either frequent episodes or one episode, included prior exacerbations, increasing dyspnoea score, increasing grade of airflow limitation, females and prior or current history of several comorbidities (eg, asthma, depression, anxiety, heart failure and cancer). Conclusions Primary care-managed patients with COPD at the highest risk of exacerbations can be identified by exploring medical history for the presence of prior exacerbations, greater COPD disease severity and co-occurrence of other medical conditions. PMID:25524545

  11. Classification of Exacerbation Frequency in the COPDGene Cohort Using Deep Learning with Deep Belief Networks.

    Science.gov (United States)

    Ying, Jun; Dutta, Joyita; Guo, Ning; Hu, Chenhui; Zhou, Dan; Sitek, Arkadiusz; Li, Quanzheng

    2016-12-21

    This study aims to develop an automatic classifier based on deep learning for exacerbation frequency in patients with chronic obstructive pulmonary disease (COPD). A threelayer deep belief network (DBN) with two hidden layers and one visible layer was employed to develop classification models and the models' robustness to exacerbation was analyzed. Subjects from the COPDGene cohort were labeled with exacerbation frequency, defined as the number of exacerbation events per year. 10,300 subjects with 361 features each were included in the analysis. After feature selection and parameter optimization, the proposed classification method achieved an accuracy of 91.99%, using a 10-fold cross validation experiment. The analysis of DBN weights showed that there was a good visual spatial relationship between the underlying critical features of different layers. Our findings show that the most sensitive features obtained from the DBN weights are consistent with the consensus showed by clinical rules and standards for COPD diagnostics. We thus demonstrate that DBN is a competitive tool for exacerbation risk assessment for patients suffering from COPD.

  12. Engagement in community activities and trust in local leaders as concomitants of psychological distress among Israeli civilians exposed to prolonged rocket attacks.

    Science.gov (United States)

    Zanbar, Lea; Kaniasty, Krzysztof; Ben-Tzur, Navit

    2018-07-01

    Present study, conducted in the aftermath of the 2014 Israel-Gaza conflict, investigated psychological toll of exposure to rockets attacks in a sample of residents of central and southern Israel. Analyses focused on the distress-protective functions of collectively grounded resources: engagement in community activities and trust in local leadership. This cross-sectional study was conducted between 2 and 3 months after the hostilities. Participants (N = 764) were recruited by an online survey company that distributed a questionnaire assessing, in addition to focal predictors, sociodemographic factors and prior exposure to trauma. The outcome variables were post-traumatic stress disorder (PTSD) and nonspecific distress symptoms. Conservative regression analyses revealed that greater exposure to rocket attacks was predictive of higher levels of posttraumatic stress symptoms. Higher engagement in community activities exhibited a partial trauma-buffering function. However, higher levels of trust in local leaders appeared to exacerbate, rather than diminish, negative impact of rocket exposure on PTSD. Symptoms of psychological distress were not influenced neither by trauma exposure nor by stressor interactions with resources. Trust in local leadership exerted a beneficial main effect on distress. Collectively based resources are important for coping in times of community-wide stressors, yet their role is complex.

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  14. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  18. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  19. Metabolomics of pulmonary exacerbations reveals the personalized nature of cystic fibrosis disease

    Directory of Open Access Journals (Sweden)

    Robert A. Quinn

    2016-08-01

    Full Text Available Background. Cystic fibrosis (CF is a genetic disease that results in chronic infections of the lungs. CF patients experience intermittent pulmonary exacerbations (CFPE that are associated with poor clinical outcomes. CFPE involves an increase in disease symptoms requiring more aggressive therapy. Methods. Longitudinal sputum samples were collected from 11 patients (n = 44 samples to assess the effect of exacerbations on the sputum metabolome using liquid chromatography-tandem mass spectrometry (LC-MS/MS. The data was analyzed with MS/MS molecular networking and multivariate statistics. Results. The individual patient source had a larger influence on the metabolome of sputum than the clinical state (exacerbation, treatment, post-treatment, or stable. Of the 4,369 metabolites detected, 12% were unique to CFPE samples; however, the only known metabolites significantly elevated at exacerbation across the dataset were platelet activating factor (PAF and a related monacylglycerophosphocholine lipid. Due to the personalized nature of the sputum metabolome, a single patient was followed for 4.2 years (capturing four separate exacerbation events as a case study for the detection of personalized biomarkers with metabolomics. PAF and related lipids were significantly elevated during CFPEs of this patient and ceramide was elevated during CFPE treatment. Correlating the abundance of bacterial 16S rRNA gene amplicons to metabolomics data from the same samples during a CFPE demonstrated that antibiotics were positively correlated to Stenotrophomonas and Pseudomonas, while ceramides and other lipids were correlated with Streptococcus, Rothia, and anaerobes. Conclusions. This study identified PAF and other inflammatory lipids as potential biomarkers of CFPE, but overall, the metabolome of CF sputum was patient specific, supporting a personalized approach to molecular detection of CFPE onset.

  20. Changes in ventilation–perfusion during and after an COPD exacerbation: an assessment using fluid dynamic modeling

    Directory of Open Access Journals (Sweden)

    Hajian B

    2018-03-01

    Full Text Available Bita Hajian,1 Jan De Backer,2 Wim Vos,2 Wouter H van Geffen,3 Paul De Winter,1 Omar Usmani,4 Tony Cahn,5 Huib AM Kerstjens,3 Massimo Pistolesi,6 Wilfried De Backer1 1Department of Respiratory Medicine, University Hospital Antwerp, Edegem, Belgium; 2FLUIDDA nv, Kontich, Belgium; 3Department of Respiratory Medicine, University Medical Center Groningen, Groningen, the Netherlands; 4Department of Pulmonology, Brompton Hospital, London, UK; 5GSK, London, UK; 6Department of Pulmonary Diseases, University of Firenze, Florence, Italy Introduction: Severe exacerbations associated with chronic obstructive pulmonary disease (COPD that require hospitalization significantly contribute to morbidity and mortality. Definitions for exacerbations are very broad, and it is unclear whether there is one predominant underlying mechanism that leads to them. Functional respiratory imaging (FRI with modeling provides detailed information about airway resistance, hyperinflation, and ventilation–perfusion (V/Q mismatch during and following an acute exacerbation. Materials and methods: Forty-two patients with COPD participating in a multicenter study were assessed by FRI, pulmonary function tests, and self-reported outcome measures during an acute exacerbation and following resolution. Arterial blood gasses and lung function parameters were measured. Results: A significant correlation was found between alveolar–arterial gradient and image-based V/Q (iV/Q, suggesting that iV/Q represents V/Q mismatch during an exacerbation (p<0.05. Conclusion: Recovery of an exacerbation is due to decreased (mainly distal airway resistance (p<0.05. Improvement in patient-reported outcomes were also associated with decreased distal airway resistance (p<0.05, but not with forced expiratory volume. FRI is, therefore, a sensitive tool to describe changes in airway caliber, ventilation, and perfusion during and after exacerbation. On the basis of the fact that FRI increased distal airway

  1. Rapid vs Maintenance Vitamin D Supplementation in Deficient Children With Asthma to Prevent Exacerbations.

    Science.gov (United States)

    Alansari, Khalid; Davidson, Bruce L; Yousef, Khalid Ibrahim; Mohamed, Abdel Nasser H; Alattar, Imad

    2017-09-01

    Whether vitamin D reduces clinically important exacerbations of childhood asthma remains uncertain. We compared rapid to maintenance vitamin D repletion analyzed by baseline vitamin D level. Children presenting to the ED with moderate-to-severe asthma exacerbations and vitamin D levels ≤ 25 ng/mL underwent masked randomization, and then open dosing to either IM+oral (the latter daily) therapy or daily oral-only therapy, and were followed for 12 months. The primary outcome was patient-initiated unplanned visits for asthma exacerbations, examined two ways: cumulative proportions with an exacerbation, and average exacerbation frequency. As this was a nutrient study, we analyzed treatment groups by quartile of baseline vitamin D level, collecting repeat levels and clinical observations at 3, 6, 9, and 12 months after enrollment. One hundred and sixteen patients in the IM+oral cohort vs 115 in the oral-only cohort had similar mean (SD) baseline levels: 15.1 (5.4) vs 15.8 (5.2) ng/mL (range, 3-25 ng/mL). There was no difference in the primary outcome over the entire 12-month observation period. However, rapid IM+oral supplementation significantly reduced unplanned visits for asthma exacerbations for children with baseline levels of 3 to 11 ng/mL during the initial 3 months: the relative exacerbation rate for the IM+oral cohort compared with the oral-only cohort at 3 months was 0.48 (95% CI, 0.28-0.89; P = .008); average exacerbation frequency per child analysis, relative rate 0.36 (95% CI, 0.13-0.87; P = .017). Otherwise, there were no significant differences between groups. Rapid compared to maintenance vitamin D supplementation for children with the lowest levels resulted in short- but not long-term reduction in asthma exacerbations. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  2. Preseasonal treatment with either omalizumab or an inhaled corticosteroid boost to prevent fall asthma exacerbations.

    Science.gov (United States)

    Teach, Stephen J; Gill, Michelle A; Togias, Alkis; Sorkness, Christine A; Arbes, Samuel J; Calatroni, Agustin; Wildfire, Jeremy J; Gergen, Peter J; Cohen, Robyn T; Pongracic, Jacqueline A; Kercsmar, Carolyn M; Khurana Hershey, Gurjit K; Gruchalla, Rebecca S; Liu, Andrew H; Zoratti, Edward M; Kattan, Meyer; Grindle, Kristine A; Gern, James E; Busse, William W; Szefler, Stanley J

    2015-12-01

    Short-term targeted treatment can potentially prevent fall asthma exacerbations while limiting therapy exposure. We sought to compare (1) omalizumab with placebo and (2) omalizumab with an inhaled corticosteroid (ICS) boost with regard to fall exacerbation rates when initiated 4 to 6 weeks before return to school. A 3-arm, randomized, double-blind, double placebo-controlled, multicenter clinical trial was conducted among inner-city asthmatic children aged 6 to 17 years with 1 or more recent exacerbations (clincaltrials.gov #NCT01430403). Guidelines-based therapy was continued over a 4- to 9-month run-in phase and a 4-month intervention phase. In a subset the effects of omalizumab on IFN-α responses to rhinovirus in PBMCs were examined. Before the falls of 2012 and 2013, 727 children were enrolled, 513 were randomized, and 478 were analyzed. The fall exacerbation rate was significantly lower in the omalizumab versus placebo arms (11.3% vs 21.0%; odds ratio [OR], 0.48; 95% CI, 0.25-0.92), but there was no significant difference between omalizumab and ICS boost (8.4% vs 11.1%; OR, 0.73; 95% CI, 0.33-1.64). In a prespecified subgroup analysis, among participants with an exacerbation during the run-in phase, omalizumab was significantly more efficacious than both placebo (6.4% vs 36.3%; OR, 0.12; 95% CI, 0.02-0.64) and ICS boost (2.0% vs 27.8%; OR, 0.05; 95% CI, 0.002-0.98). Omalizumab improved IFN-α responses to rhinovirus, and within the omalizumab group, greater IFN-α increases were associated with fewer exacerbations (OR, 0.14; 95% CI, 0.01-0.88). Adverse events were rare and similar among arms. Adding omalizumab before return to school to ongoing guidelines-based care among inner-city youth reduces fall asthma exacerbations, particularly among those with a recent exacerbation. Copyright © 2015 American Academy of Allergy, Asthma & Immunology. All rights reserved.

  3. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  4. Monitoring of Physiological Parameters to Predict Exacerbations of Chronic Obstructive Pulmonary Disease (COPD: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Ahmed M. Al Rajeh

    2016-11-01

    Full Text Available Introduction: The value of monitoring physiological parameters to predict chronic obstructive pulmonary disease (COPD exacerbations is controversial. A few studies have suggested benefit from domiciliary monitoring of vital signs, and/or lung function but there is no existing systematic review. Objectives: To conduct a systematic review of the effectiveness of monitoring physiological parameters to predict COPD exacerbation. Methods: An electronic systematic search compliant with Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA guidelines was conducted. The search was updated to April 6, 2016. Five databases were examined: Medical Literature Analysis and Retrieval System Online, or MEDLARS Online (Medline, Excerpta Medica dataBASE (Embase, Allied and Complementary Medicine Database (AMED, Cumulative Index of Nursing and Allied Health Literature (CINAHL and the Cochrane clinical trials database. Results: Sixteen articles met the pre-specified inclusion criteria. Fifteen of these articules reported positive results in predicting COPD exacerbation via monitoring of physiological parameters. Nine studies showed a reduction in peripheral oxygen saturation (SpO2% prior to exacerbation onset. Three studies for peak flow, and two studies for respiratory rate reported a significant variation prior to or at exacerbation onset. A particular challenge is accounting for baseline heterogeneity in parameters between patients. Conclusion: There is currently insufficient information on how physiological parameters vary prior to exacerbation to support routine domiciliary monitoring for the prediction of exacerbations in COPD. However, the method remains promising.

  5. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  6. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  7. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  8. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  9. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  10. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  11. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  12. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  13. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  14. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  15. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  16. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  17. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  18. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  19. Effects of seasonal smog on asthma and COPD exacerbations requiring emergency visits in Chiang Mai, Thailand.

    Science.gov (United States)

    Pothirat, Chaicharn; Tosukhowong, Apiwat; Chaiwong, Warawut; Liwsrisakun, Chalerm; Inchai, Juthamas

    2016-12-01

    Seasonal smog produces particulate matters that are less than 10 microns in diameter (PM₁₀), which are known to have several impacts on the respiratory system. This study was to determine the association of an increased PM10 level due to seasonal smog in Chiang Mai and emergency visits for asthma and chronic obstructive pulmonary disease (COPD) exacerbations. A retrospective cross-sectional study was conducted between the months of January and March from 2006 until 2009. The association of an increased PM₁₀ level and the daily number of asthma and COPD exacerbations were analyzed using a generalized linear model; a Poisson regression model was fit to the number of daily emergency visits using predictor variables: lags of PM10, day of the week, and time. There were a total of 917 emergency visits for acute exacerbations of asthma and COPD, with a median of 2 visits per day (range 0-10). The median PM₁₀ level during the same interval was 64.5 microgram per cubic meter (μg/m3) (16-304). For every 10 μg/m3 rise in PM10 concentration, there was a lag time of 6 days for asthma exacerbations [Adjusted relative risk (RR)=1.020; 95% confident interval (CI), 1.001-1.040; (p=0.014)], 7 days for COPD exacerbations [RR=1.030; 95%CI, 1.010-1.050 (p=0.024)] and 7 days for all exacerbations [RR=1.030 95%CI, 1.010-1.040 (p<0.001)]. This study confirms the effect of increasing PM₁₀ concentrations from seasonal smog on asthma and COPD exacerbations. However, there was an approximately 1 week lag time between the elevated PM₁₀ levels and time to emergency visits due to disease exacerbation.

  20. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  1. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  2. Does gastroesophageal reflux increase chronic obstructive pulmonary disease exacerbations?

    Science.gov (United States)

    Iliaz, Sinem; Iliaz, Raim; Onur, Seda Tural; Arici, Serpil; Akyuz, Umit; Karaca, Cetin; Demir, Kadir; Besisik, Fatih; Kaymakoglu, Sabahattin; Akyuz, Filiz

    2016-06-01

    The relationship between chronic obstructive pulmonary disease (COPD) exacerbations and gastroesophageal reflux (GER) has been investigated less than asthma-GER. We aimed to evaluate the presence of GER in patients with COPD and its impact on exacerbations. We included 24 patients with stable mild-moderate stage COPD and 19 volunteers as the control group. We conducted a gastroesophageal reflux disease (GERD) symptom questionnaire, gastroscopy, manometry, and an ambulatory 24-h pH-impedance study. According to the GERD questionnaire, only 5 (20.8%) patients with COPD had typical GER symptoms. According to the 24-h pH-impedance study, the mean DeMeester score (DMS) was 38.1 ± 34.6 in the COPD group and 13.3 ± 16.8 in the control group (p = 0.01). The acid reflux (DMS > 14.7) rate was higher in patients with COPD than in controls (73.9% vs 26.3%, p = 0.01). The symptom association probability positivity rate was 17.4% (n = 4) in the COPD group, which was similar to the controls (p = 0.11). The mean proximal extension rate of reflux (Z 17 cm) was 26.4 ± 12.9% in the COPD group. The proximal extent of reflux was positively correlated with the number of COPD exacerbations per year (p = 0.03, r = 0.448). In the motility results, only 2 (20%) patients in the control group had a minor motility disorder. Seventeen (70.8%) patients in the COPD group had a minor motility disorder, and 4 (16.7%) had major motility disorders (p gastroesophageal reflux was frequent in patients with COPD, but only a quarter had typical reflux symptoms. The proximal extent of reflux may trigger frequent exacerbations of COPD. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Susceptibility to exacerbation in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Hurst, John R; Vestbo, Jørgen; Anzueto, Antonio

    2010-01-01

    be predicted on the basis of the patient's recall of previous treated events. In addition to its association with more severe disease and prior exacerbations, the phenotype was independently associated with a history of gastroesophageal reflux or heartburn, poorer quality of life, and elevated white-cell count...

  5. The premenstrual period and exacerbations in multiple sclerosis

    NARCIS (Netherlands)

    Zorgdrager, A; De Keyser, J

    2002-01-01

    The aim of this study was to assess whether an association exists between the premenstrual period and exacerbations of multiple sclerosis (MS). The subjects were 56 premenopausal patients with relapsing MS and a regular menstrual cycle. Data over the previous 2 years were gathered from a structured

  6. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  7. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  8. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  9. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  10. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  11. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  13. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  14. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  15. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  16. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  17. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  18. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  19. Serum Reactive Oxygen Metabolite Levels Predict Severe Exacerbations of Asthma

    Science.gov (United States)

    Nakamoto, Keitaro; Watanabe, Masato; Sada, Mitsuru; Inui, Toshiya; Nakamura, Masuo; Honda, Kojiro; Wada, Hiroo; Mikami, Yu; Matsuzaki, Hirotaka; Horie, Masafumi; Noguchi, Satoshi; Yamauchi, Yasuhiro; Koyama, Hikari; Kogane, Toshiyuki; Kohyama, Tadashi; Takizawa, Hajime

    2016-01-01

    Background and Purpose Bronchial asthma (BA) is a chronic airway disease characterized by airway hyperresponsiveness and remodeling, which are intimately linked to chronic airway inflammation. Reactive oxygen species (ROS) such as hydrogen peroxide are generated by inflammatory cells that are involved in the pathogenesis of BA. However, the role of ROS in the management of BA patients is not yet clear. We attempted to determine the role of ROS as a biomarker in the clinical setting of BA. Subjects and Methods We enrolled patients with BA from 2013 through 2015 and studied the degrees of asthma control, anti-asthma treatment, pulmonary function test results, fractional exhaled nitric oxide (FeNO), serum reactive oxygen metabolite (ROM) levels, and serum levels of interleukin (IL)-6 and IL-8. Results We recruited 110 patients with BA. Serum ROM levels correlated with white blood cell (WBC) count (rs = 0.273, p = 0.004), neutrophil count (rs = 0.235, p = 0.014), CRP (rs = 0.403, p < 0.001), and IL-6 (rs = 0.339, p < 0.001). Serum ROM levels and IL-8 and CRP levels negatively correlated with %FEV1 (rs = -0.240, p = 0.012, rs = -0.362, p < 0.001, rs = -0.197, p = 0.039, respectively). Serum ROM levels were significantly higher in patients who experienced severe exacerbation within 3 months than in patients who did not (339 [302–381] vs. 376 [352–414] CARR U, p < 0.025). Receiver-operating characteristics analysis showed that ROM levels correlated significantly with the occurrence of severe exacerbation (area under the curve: 0.699, 95% CI: 0.597–0.801, p = 0.025). Conclusions Serum levels of ROM were significantly associated with the degrees of airway obstruction, WBC counts, neutrophil counts, IL-6, and severe exacerbations. This biomarker may be useful in predicting severe exacerbations of BA. PMID:27776186

  20. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  1. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  2. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  3. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  4. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  5. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  6. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  7. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  8. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  9. Exonic variants associated with development of aspirin exacerbated respiratory diseases.

    Directory of Open Access Journals (Sweden)

    Seung-Woo Shin

    Full Text Available Aspirin-exacerbated respiratory disease (AERD is one phenotype of asthma, often occurring in the form of a severe and sudden attack. Due to the time-consuming nature and difficulty of oral aspirin challenge (OAC for AERD diagnosis, non-invasive biomarkers have been sought. The aim of this study was to identify AERD-associated exonic SNPs and examine the diagnostic potential of a combination of these candidate SNPs to predict AERD. DNA from 165 AERD patients, 397 subjects with aspirin-tolerant asthma (ATA, and 398 normal controls were subjected to an Exome BeadChip assay containing 240K SNPs. 1,023 models (210-1 were generated from combinations of the top 10 SNPs, selected by the p-values in association with AERD. The area under the curve (AUC of the receiver operating characteristic (ROC curves was calculated for each model. SNP Function Portal and PolyPhen-2 were used to validate the functional significance of candidate SNPs. An exonic SNP, exm537513 in HLA-DPB1, showed the lowest p-value (p = 3.40×10-8 in its association with AERD risk. From the top 10 SNPs, a combination model of 7 SNPs (exm537513, exm83523, exm1884673, exm538564, exm2264237, exm396794, and exm791954 showed the best AUC of 0.75 (asymptotic p-value of 7.94×10-21, with 34% sensitivity and 93% specificity to discriminate AERD from ATA. Amino acid changes due to exm83523 in CHIA were predicted to be "probably damaging" to the structure and function of the protein, with a high score of '1'. A combination model of seven SNPs may provide a useful, non-invasive genetic marker combination for predicting AERD.

  10. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  11. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  12. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  13. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  14. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  15. T cells exacerbate Lyme borreliosis in TLR2-deficient mice

    Directory of Open Access Journals (Sweden)

    Carrie E. Lasky

    2016-11-01

    Full Text Available Infection of humans with the spirochete, Borrelia burgdorferi, causes Lyme borreliosis and can lead to clinical manifestations such as, arthritis, carditis and neurological conditions. Experimental infection of mice recapitulates many of these symptoms and serves as a model system for the investigation of disease pathogenesis and immunity. Innate immunity is known to drive the development of Lyme arthritis and carditis, but the mechanisms driving this response remain unclear. Innate immune cells recognize B. burgdorferi surface lipoproteins primarily via Toll-like receptor (TLR2; however, previous work has demonstrated TLR2-/- mice had exacerbated disease and increased bacterial burden. We demonstrate increased CD4 and CD8 T cell infiltrates in B. burgdorferi-infected joints and hearts of C3H TLR2-/- mice. In vivo depletion of either CD4 or CD8 T cells reduced Borrelia-induced joint swelling and lowered tissue spirochete burden, while depletion of CD8 T cells alone reduced disease severity scores. Exacerbation of Lyme arthritis correlated with increased production of CXCL9 by synoviocytes and this was reduced with CD8 T cell depletion. These results demonstrate T cells can exacerbate Lyme disease pathogenesis and prolong disease resolution possibly through dysregulation of inflammatory responses and inhibition of bacterial clearance.

  16. Day-to-day measurement of patient-reported outcomes in exacerbations of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Kocks JWH

    2013-06-01

    Full Text Available Jan Willem H Kocks,1,2 Jan Willem K van den Berg,3 Huib AM Kerstjens,2,4 Steven M Uil,3 Judith M Vonk,2,5 Ynze P de Jong,3 Ioanna G Tsiligianni,1,2 Thys van der Molen1,2 1Department of General Practice, 2Groningen Research Institute for Asthma and COPD, University of Groningen, University Medical Center Groningen, Groningen, 3Department of Pulmonary Diseases, Isala Klinieken, Zwolle, 4Department of Pulmonary Diseases and Tuberculosis, 5Department of Epidemiology, University of Groningen, University Medical Center Groningen, Groningen, The Netherlands Background: Exacerbations of chronic obstructive pulmonary disease (COPD are a major burden to patients and to society. Little is known about the possible role of day-to-day patient-reported outcomes during an exacerbation. This study aims to describe the day-to-day course of patient-reported health status during exacerbations of COPD and to assess its value in predicting clinical outcomes. Methods: Data from two randomized controlled COPD exacerbation trials (n = 210 and n = 45 patients were used to describe both the feasibility of daily collection of and the day-to-day course of patient-reported outcomes during outpatient treatment or admission to hospital. In addition to clinical parameters, the BORG dyspnea score, the Clinical COPD Questionnaire (CCQ, and the St George's Respiratory Questionnaire were used in Cox regression models to predict treatment failure, time to next exacerbation, and mortality in the hospital study. Results: All patient-reported outcomes showed a distinct pattern of improvement. In the multivariate models, absence of improvement in CCQ symptom score and impaired lung function were independent predictors of treatment failure. Health status and gender predicted time to next exacerbation. Five-year mortality was predicted by age, forced expiratory flow in one second % predicted, smoking status, and CCQ score. In outpatient management of exacerbations, health status was found

  17. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  18. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  19. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  20. Influence of psychological factors on acute exacerbation of tension-type headache: Investigation by ecological momentary assessment.

    Science.gov (United States)

    Kikuchi, Hiroe; Yoshiuchi, Kazuhiro; Ando, Tetsuya; Yamamoto, Yoshiharu

    2015-09-01

    In this study, we investigated whether psychological factors were associated with subsequent acute exacerbation of tension-type headache (TTH) in a prospective and ecologically valid manner with computerized ecological momentary assessment. Eighteen women and five men with TTH wore watch-type computers that acted as an electronic diary for 1week. The subjects recorded momentary headache intensity, psychological stress, anxiety, and depressive mood with a visual analog scale of 0-100 approximately every 6h as well as when waking up, when going to bed, and at acute headache exacerbations. Multilevel logistic regression analysis with acute headache exacerbation occurrence as the outcome was conducted. Person-mean centering was applied to psychological factors to disaggregate between- and within-individual association. Momentary psychological stress was associated with subsequent increase in headache exacerbation within 3h [Odds Ratio (95% CI)=1.32 (1.07, 1.64) for 10-point increments] while the individual mean of psychological stress was not. These results support the possibility that psychological stress could trigger acute exacerbations of TTH. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  2. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  3. COPD management costs according to the frequency of COPD exacerbations in UK primary care.

    Science.gov (United States)

    Punekar, Yogesh Suresh; Shukla, Amit; Müllerova, Hana

    2014-01-01

    The economic burden of chronic obstructive pulmonary disease (COPD) exacerbations is significant, but the impact of other sources on the overall cost of COPD management is largely unknown. We aimed to estimate overall costs for patients experiencing none, one, or two or more exacerbations per year in the UK. A retrospective cohort of prevalent COPD patients was identified in the Clinical Practice Research Datalink UK database. Patients with information recorded for at least 12 months before and after cohort entry date were included (first prevalent COPD diagnosis confirmed by spirometry on/after April 1, 2009). Patients were categorized as having none, one, or two or more moderate-to-severe COPD exacerbations in the 12 months after cohort entry and further classified by the Global initiative for chronic Obstructive Lung Disease (GOLD) category of airflow obstruction and the Medical Research Council dyspnea scale. Study outcomes included counts of general practitioner interactions, moderate-severe COPD exacerbations, and non-COPD hospitalizations. Estimated resource use costs were calculated using National Health Service reference costs for 2010-2011. The cohort comprised 58,589 patients (mean age 69.5 years, mean dyspnea grade 2.5, females 46.6%, current smokers 33.1%). The average total annual per patient cost of COPD management, excluding medications, was £2,108 for all patients and £1,523, £2,405, and £3,396 for patients experiencing no, one, or two or more moderate-to-severe exacerbations, respectively. General practitioner interactions contributed most to these annual costs, accounting for £1,062 (69.7%), £1,313 (54.6%), and £1,592 (46.9%) in patients with no, one, or two or more moderate-to-severe exacerbations, respectively. Disease management strategies focused on reducing costs in primary care may help reduce total COPD costs significantly.

  4. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  5. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  6. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  7. TBC1D24, an ARF6-interacting protein, is mutated in familial infantile myoclonic epilepsy.

    Science.gov (United States)

    Falace, Antonio; Filipello, Fabia; La Padula, Veronica; Vanni, Nicola; Madia, Francesca; De Pietri Tonelli, Davide; de Falco, Fabrizio A; Striano, Pasquale; Dagna Bricarelli, Franca; Minetti, Carlo; Benfenati, Fabio; Fassio, Anna; Zara, Federico

    2010-09-10

    Idiopathic epilepsies (IEs) are a group of disorders characterized by recurrent seizures in the absence of detectable brain lesions or metabolic abnormalities. IEs include common disorders with a complex mode of inheritance and rare Mendelian traits suggesting the occurrence of several alleles with variable penetrance. We previously described a large family with a recessive form of idiopathic epilepsy, named familial infantile myoclonic epilepsy (FIME), and mapped the disease locus on chromosome 16p13.3 by linkage analysis. In the present study, we found that two compound heterozygous missense mutations (D147H and A509V) in TBC1D24, a gene of unknown function, are responsible for FIME. In situ hybridization analysis revealed that Tbc1d24 is mainly expressed at the level of the cerebral cortex and the hippocampus. By coimmunoprecipitation assay we found that TBC1D24 binds ARF6, a Ras-related family of small GTPases regulating exo-endocytosis dynamics. The main recognized function of ARF6 in the nervous system is the regulation of dendritic branching, spine formation, and axonal extension. TBC1D24 overexpression resulted in a significant increase in neurite length and arborization and the FIME mutations significantly reverted this phenotype. In this study we identified a gene mutation involved in autosomal-recessive idiopathic epilepsy, unveiled the involvement of ARF6-dependent molecular pathway in brain hyperexcitability and seizures, and confirmed the emerging role of subtle cytoarchitectural alterations in the etiology of this group of common epileptic disorders. 2010 The American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  8. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  9. Asthma exacerbations during the first trimester of pregnancy and congenital malformations: revisiting the association in a large representative cohort.

    Science.gov (United States)

    Blais, Lucie; Kettani, Fatima-Zohra; Forget, Amélie; Beauchesne, Marie-France; Lemière, Catherine

    2015-07-01

    We previously reported an increased prevalence of any congenital malformation among women experiencing moderate-to-severe asthma exacerbations during the first trimester of pregnancy, based on a study in which 90.1% of the cohort of women were social welfare recipients. This study re-examined the association between asthma exacerbations and congenital malformations in a new large representative cohort of asthmatic pregnant women. A cohort of 36 587 pregnancies in asthmatic women was reconstructed from Québec Province administrative databases (1998-2009). Occurrences of asthma exacerbations during the first trimester of pregnancy were assessed and categorised into severe, moderate and no such exacerbations. For comparison, we also considered moderate and severe asthma exacerbations combined. Congenital malformations were identified using diagnoses recorded in the hospitalisation database. Generalised estimation equations were used to estimate adjusted ORs of congenital malformations. The prevalence of any congenital malformation was 19.1%, 11.7% and 12.0% among women with severe, moderate and no such exacerbations during the first trimester, respectively. The adjusted OR for all malformations was 1.64 (95% CI 1.02 to 2.64) when women with severe exacerbations were compared with those in the reference group, while no association was seen for moderate exacerbations. Also, no association was observed between cases of moderate and severe asthma exacerbations combined and any congenital malformation. Only severe asthma exacerbations were found to significantly increase the risk of congenital malformations in this representative study. Previous studies possibly overestimated the risk because they were based mainly on women at a lower socioeconomic status. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  10. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  11. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  12. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  13. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  14. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  15. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  16. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  17. Study design considerations in a large COPD trial comparing effects of tiotropium with salmeterol on exacerbations

    NARCIS (Netherlands)

    K-M. Beeh (Kai-Michael); B. Hederer (Bettina); T. Glaab (Thomas); A. Müller (Achim); M.P.M.H. Rutten-van Mölken (Maureen); S. Kesten (Steven); C. Vogelmeier (Claus)

    2009-01-01

    textabstractAbstract Currently available long-acting inhaled bronchodilators (tiotropium, salmeterol, formoterol) have demonstrated beneficial effects on exacerbations in placebo-controlled trials. However, there have been no direct comparisons of these drugs with exacerbations as the primary

  18. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  19. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  20. The association between previous and future severe exacerbations of chronic obstructive pulmonary disease: Updating the literature using robust statistical methodology.

    Science.gov (United States)

    Sadatsafavi, Mohsen; Xie, Hui; Etminan, Mahyar; Johnson, Kate; FitzGerald, J Mark

    2018-01-01

    There is minimal evidence on the extent to which the occurrence of a severe acute exacerbation of COPD that results in hospitalization affects the subsequent disease course. Previous studies on this topic did not generate causally-interpretable estimates. Our aim was to use corrected methodology to update previously reported estimates of the associations between previous and future exacerbations in these patients. Using administrative health data in British Columbia, Canada (1997-2012), we constructed a cohort of patients with at least one severe exacerbation, defined as an episode of inpatient care with the main diagnosis of COPD based on international classification of diseases (ICD) codes. We applied a random-effects 'joint frailty' survival model that is particularly developed for the analysis of recurrent events in the presence of competing risk of death and heterogeneity among individuals in their rate of events. Previous severe exacerbations entered the model as dummy-coded time-dependent covariates, and the model was adjusted for several observable patient and disease characteristics. 35,994 individuals (mean age at baseline 73.7, 49.8% female, average follow-up 3.21 years) contributed 34,271 severe exacerbations during follow-up. The first event was associated with a hazard ratio (HR) of 1.75 (95%CI 1.69-1.82) for the risk of future severe exacerbations. This risk decreased to HR = 1.36 (95%CI 1.30-1.42) for the second event and to 1.18 (95%CI 1.12-1.25) for the third event. The first two severe exacerbations that occurred during follow-up were also significantly associated with increased risk of all-cause mortality. There was substantial heterogeneity in the individual-specific rate of severe exacerbations. Even after adjusting for observable characteristics, individuals in the 97.5th percentile of exacerbation rate had 5.6 times higher rate of severe exacerbations than those in the 2.5th percentile. Using robust statistical methodology that controlled

  1. Changes in ventilation-perfusion during and after an COPD exacerbation : an assessment using fluid dynamic modeling

    NARCIS (Netherlands)

    Hajian, Bita; De Backer, Jan; Vos, Wim; van Geffen, Wouter H; De Winter, Paul; Usmani, Omar; Cahn, Tony; Kerstjens, Huib Am; Pistolesi, Massimo; De Backer, Wilfried

    2018-01-01

    Introduction: Severe exacerbations associated with chronic obstructive pulmonary disease (COPD) that require hospitalization significantly contribute to morbidity and mortality. Definitions for exacerbations are very broad, and it is unclear whether there is one predominant underlying mechanism that

  2. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  3. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  4. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  5. Chronic Hepatitis B with Spontaneous Severe Acute Exacerbation

    Directory of Open Access Journals (Sweden)

    Wei-Lun Tsai

    2015-11-01

    Full Text Available Chronic hepatitis B virus (HBV infection is a major global health problem with an estimated 400 million HBV carriers worldwide. In the natural history of chronic hepatitis B (CHB, spontaneous acute exacerbation (AE is not uncommon, with a cumulative incidence of 10%–30% every year. While exacerbations can be mild, some patients may develop hepatic decompensation and even die. The underlying pathogenesis is possibly related to the activation of cytotoxic T lymphocyte-mediated immune response against HBV. An upsurge of serum HBV DNA usually precedes the rise of alanine aminotransferase (ALT and bilirubin. Whether antiviral treatment can benefit CHB with severe AE remains controversial, but early nucleos(tide analogues treatment seemed to be associated with an improved outcome. There has been no randomized study that compared the effects of different nucleos(tide analogues (NA in the setting of CHB with severe AE. However, potent NAs with good resistance profiles are recommended. In this review, we summarized current knowledge regarding the natural history, pathogenetic mechanisms, and therapeutic options of CHB with severe AE.

  6. [Early exercise training after exacerbation in patients with chronic respiratory failure].

    Science.gov (United States)

    Takahashi, Hiromitsu; Molleyres, Sandrine; Dousse, Nicolas; Contal, Olivier; Janssens, Jean-Paul

    2011-11-23

    Patients who suffered from an exacerbation of a chronic respiratory disorder are often very limited in terms of their exercise capacity because of severe dyspnea and amyotrophy of peripheral muscles. Early implementation of pulmonary rehabilitation may help these patients to avoid the complications of a prolonged bedridden period, and increase more rapidly their mobility. Early rehabilitation has become more frequent, but requires special skills from the care givers (chest therapists). Techniques which enhance muscular performance and motility of patients who are recovering from an exacerbation such as electromoystimulation or mobilisation under non-invasive ventilation, give encouraging results; their impact on length of hospital stay requires further studies.

  7. Parameters recorded by software of non-invasive ventilators predict COPD exacerbation: a proof-of-concept study.

    Science.gov (United States)

    Borel, Jean-Christian; Pelletier, Julie; Taleux, Nellie; Briault, Amandine; Arnol, Nathalie; Pison, Christophe; Tamisier, Renaud; Timsit, Jean-François; Pepin, Jean-Louis

    2015-03-01

    To assess whether daily variations in three parameters recorded by non-invasive ventilation (NIV) software (respiratory rate (RR), percentage of respiratory cycles triggered by the patient (%Trigg) and NIV daily use) predict the risk of exacerbation in patients with chronic obstructive pulmonary disease (COPD) treated by home NIV. Patients completed the EXACT-Pro questionnaire daily to detect exacerbations. The 25th and 75th percentiles of each 24 h NIV parameter were calculated and updated daily. For a given day, when the value of any parameter was >75th or 75th, 'low value' <25th). Stratified conditional logistic regressions estimated the risk of exacerbation when ≥2 days (for RR and %Trigg) or ≥3 days (for NIV use) out of five had an 'abnormal value'. Sixty-four patients were included. Twenty-one exacerbations were detected and medically confirmed. The risk of exacerbation was increased when RR (OR 5.6, 95% CI 1.4 to 22.4) and %Trigg (OR 4.0, 95% CI 1.1 to 14.5) were considered as 'high value' on ≥2 days out of five. This proof-of-concept study shows that daily variations in RR and %Trigg are predictors of an exacerbation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. [Chronic obstructive pulmonary disease: 2. Short-term prognostic scores for acute exacerbations].

    Science.gov (United States)

    Junod, Alain F

    2014-01-22

    The chronic obstructive pulmonary disease or COPD is a slowly progressive disease whose course is frequently the subject of acute episodes, of variable severity, although, in general, reversible, called acute exacerbations. In the past five years (between 2008 and 2013), seven prognostic scores have been published to try to assess the short-term risk of these acute exacerbations. Their components and characteristics are analysed and commented upon. An Internet program with a detailed compilation of the main features of these scores (www.medhyg.ch/scoredoc) supplements this review.

  9. Diagnosis and management of acute exacerbation of chronic obstructive pulmonary disease [digest].

    Science.gov (United States)

    Holden, Van; Slack, Donald; McCurdy, Michael T; Shah, Nirav G; Gupta, Nachi; Nusbaum, Jeffrey

    2017-10-20

    Acute exacerbation of chronic obstructive pulmonary disease (COPD) is a clinical diagnosis that is based on changes in dyspnea, cough, and/or sputum production in a COPD patient; however, patients presenting with an acute exacerbation may be undiagnosed or have a variety of comorbid conditions that can complicate diagnosis. This issue presents strategies and algorithms for the early use of evidence-based interventions, including appropriate use of antibiotics, bronchodilators, and corticosteroids, along with noninvasive ventilation with capnography, to minimize morbidity and mortality associated with this disease. [Points & Pearls is a digest of Emergency Medicine Practice.].

  10. Risk factors for asthma exacerbation in patients presenting to an ...

    African Journals Online (AJOL)

    Conclusion: Lack of corticosteroid use and upper respiratory tract infections are ... Key words: Asthma, asthma exacerbations, risk factors, corticosteroids ..... recall bias may be a limitation. ... obstructive picture on spirometry were included as.

  11. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  12. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  13. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  14. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  15. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  16. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  17. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  18. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  19. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  20. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.