WorldWideScience

Sample records for exogenous genotoxic attack

  1. Exogenous deposits

    International Nuclear Information System (INIS)

    Khasanov, A.Kh.

    1988-01-01

    Exogenous deposits forming as a result of complex exogenous processes, passed under the influence of outside forces on the Earth surface. To them relate physical and chemical weathering, decomposition and decay of mineral masses, redistribution and transportation of material, forming and deposit of new minerals and ores steady on the earth surface conditions

  2. Exogenous Ochronosis

    Directory of Open Access Journals (Sweden)

    Prachi A Bhattar

    2015-01-01

    Full Text Available Exogenous ochronosis (EO is a cutaneous disorder characterized by blue-black pigmentation resulting as a complication of long-term application of skin-lightening creams containing hydroquinone but may also occur due to topical contact with phenol or resorcinol in dark-skinned individuals. It can also occur following the use of systemic antimalarials such as quinine. EO is clinically and histologically similar to its endogenous counterpart viz., alkaptonuria, which, however, exhibits systemic effects and is an inherited disorder. Dermoscopy and in vivo skin reflectance confocal microscopy are noninvasive in vivo diagnostic tools. It is very difficult to treat EO, a cosmetically disfiguring and troubling disorder with disappointing treatment options.

  3. Genotoxicity of swine effluents.

    Science.gov (United States)

    Techio, V H; Stolberg, J; Kunz, A; Zanin, E; Perdomo, C C

    2011-01-01

    This study aimed at the investigation of genotoxic effects of swine effluents from different stages of a treatment system for swine wastes through bioassay of stamen hairs and micronuclei in Tradescantia (clone BNL 4430). No significant differences (p≥0.05) regarding the genic mutations were found in the bioassay of stamen hairs, independently of the effluent analysed. For the genotoxicity test with micronuclei, the plants exposed to raw wastes, to sludge, and to effluent of the biodigester have presented higher rates of chromosomal damages (micronuclei), with significant differences in relation to the control group and other effluent of the waste treatment system (p≤0.05). The association between the chemical parameters and the genotoxicity data have shown that the variables COD and TKN have presented significant correlation (p≤0.05) with the number of mutagenic events in the tetrads.

  4. Genotoxicity of metal nanoparticles.

    Science.gov (United States)

    Xie, Hong; Mason, Michael M; Wise, John Pierce

    2011-01-01

    Nanotechnology is currently used in industry, medicine, and military applications, as well as in more than 300 commercial products. Yet, the same properties that make these particles exciting for technology also make them daunting public health concerns because their toxicity is unknown and relatively unexplored. Increased attention is being placed on the study of metal particle genotoxicity; however, a lot of unknowns remain about their effects and the mechanisms. In this article, we highlight some metal and metal oxide nanoparticles of interest and discuss the current in vivo and in vitro studies of genotoxic effects. Many metal nanoparticles were found to cause chromosomal aberrations, DNA strand breaks, oxidative DNA damage, and mutations. Inconsistencies are found in the literature, however, thus drawing conclusions is difficult due to a variety of factors. Therefore, the areas requiring further attention are highlighted and recommendations to improve our understanding of the genotoxic potential are addressed.

  5. Genotoxic effect of alkaloids

    Directory of Open Access Journals (Sweden)

    J. A. P. Henriques

    1991-01-01

    Full Text Available Because of the increase use of alkaloids in general medical practice in recent years, it is of interest to determine genotoxic, mutagenic and recombinogenic response to different groups of alkaloids in prokaryotic and eucaryotic organisms. Reserpine, boldine and chelerythrine did not show genotoxicity response in the SOS-Chromotest whereas skimmianine showed genotixicity in the presence of a metabolic activation mixture. Voacristine isolated fromthe leaves of Ervatamia coronaria shows in vivo cytostatic and mutagenic effects in Saccharomyces cerevisiae hapioids cells. The Rauwolfia alkaloid (reserpine was not able to induce reverse mutation and recombinational mitotic events (crossing-over and gene conversion in yeast diploid strain XS2316.

  6. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  7. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Exogenous vs. Endogenous Separation

    OpenAIRE

    Ramey, Garey

    2008-01-01

    This paper assesses how various approaches to modelling the separation margin a¤ect the ability of the Mortensen-Pissarides job matching model to explain key facts about the aggregate labor market. Allowing for realistic time variation in the separation rate, whether exogenous or endogenous, greatly in- creases the unemployment variability generated by the model. Speci…cations with exogenous separation rates, whether constant or time-varying, fail to pro- duce realistic volatility and prod...

  10. Genotoxicity assessment of some cosmetic and food additives.

    Science.gov (United States)

    Di Sotto, Antonella; Maffei, Francesca; Hrelia, Patrizia; Di Giacomo, Silvia; Pagano, Ester; Borrelli, Francesca; Mazzanti, Gabriela

    2014-02-01

    α-Hexylcinnamaldehyde (HCA) and p-tert-butyl-alpha-methylhydrocinnamic aldehyde (BMHCA) are synthetic aldehydes, characterized by a typical floral scent, which makes them suitable to be used as fragrances in personal care (perfumes, creams, shampoos, etc.) and household products, and as flavouring additives in food and pharmaceutical industry. The aldehydic structure suggests the need for a safety assessment for these compounds. Here, HCA and BMHCA were evaluated for their potential genotoxic risk, both at gene level (frameshift or base-substitution mutations) by the bacterial reverse mutation assay (Ames test), and at chromosomal level (clastogenicity and aneuploidy) by the micronucleus test. In order to evaluate a primary and repairable DNA damage, the comet assay has been also included. In spite of their potential hazardous chemical structure, a lack of mutagenicity was observed for both compounds in all bacterial strains tested, also in presence of the exogenous metabolic activator, showing that no genotoxic derivatives were produced by CYP450-mediated biotransformations. Neither genotoxicity at chromosomal level (i.e. clastogenicity or aneuploidy) nor single-strand breaks were observed. These findings will be useful in further assessing the safety of HCA and BMHCA as either flavour or fragrance chemicals. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. In silico prediction of genotoxicity.

    Science.gov (United States)

    Wichard, Jörg D

    2017-08-01

    The in silico prediction of genotoxicity has made considerable progress during the last years. The main driver for the pharmaceutical industry is the ICH M7 guideline about the assessment of DNA reactive impurities. An important component of this guideline is the use of in silico models as an alternative approach to experimental testing. The in silico prediction of genotoxicity provides an established and accepted method that defines the first step in the assessment of DNA reactive impurities. This was made possible by the growing amount of reliable Ames screening data, the attempts to understand the activity pathways and the subsequent development of computer-based prediction systems. This paper gives an overview of how the in silico prediction of genotoxicity is performed under the ICH M7 guideline. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Exogenous lipid pneumonia

    International Nuclear Information System (INIS)

    Bernasconi, A.; Gavelli, G.; Zompatori, M.; Galleri, C.; Zanasi, A.; Fabbri, M.; Bazzocchi, F.

    1988-01-01

    Exogenous lipid pneumonia (ELP) is caused by the aspiration of animal, vegetal or, more often, mineral oils. Even though it may also be acute, ELP is most frequently a chronic disease, affecting people with predisposing factors, such as neuromuscular disorders, structural abnormalities and so on; very often exogenous lipid pneumonia is found in tracheotomized patients. The pathology of lipid pneumonia is a chronic inflammatory process evolving in foreign-body-like reaction, and eventually in ''end-stage lung'' condition. Clinically, most patients are asymptomatic; few cases only present with cough, dyspnea and chest pain. Eight cases of ELP, studied over the past 3 years, are described in this paper. All the patients were examined by chest radiographs and standard tomograms; 3 patients underwent CT. X-ray features were mono/bilateral consolidation of the lower zones, with air bronchogram and variable reduction in volume. CT density was not specific for fat tissue. In all cases the diagnosis was confirmed at biopsy. In 5 patients, followed for at least one year, clinical-radiological features showed no change. Thus, complications of ELP (especially malignant evolution) could be excluded. The authors conclude that lipid pneumonia must be considered in differential diagnosis of patients with history of usage of oils and compatible X-ray findings. The usefulness of an accurate follow-up is stressed

  13. Endogenous versus exogenous shocks in systems with memory

    Science.gov (United States)

    Sornette, D.; Helmstetter, A.

    2003-02-01

    Systems with long-range persistence and memory are shown to exhibit different precursory as well as recovery patterns in response to shocks of exogenous versus endogenous origins. By endogenous, we envision either fluctuations resulting from an underlying chaotic dynamics or from a stochastic forcing origin which may be external or be an effective coarse-grained description of the microscopic fluctuations. In this scenario, endogenous shocks result from a kind of constructive interference of accumulated fluctuations whose impacts survive longer than the large shocks themselves. As a consequence, the recovery after an endogenous shock is in general slower at early times and can be at long times either slower or faster than after an exogenous perturbation. This offers the tantalizing possibility of distinguishing between an endogenous versus exogenous cause of a given shock, even when there is no “smoking gun”. This could help in investigating the exogenous versus self-organized origins in problems such as the causes of major biological extinctions, of change of weather regimes and of the climate, in tracing the source of social upheaval and wars, and so on. Sornette et al., Volatility fingerprints of large stocks: endogenous versus exogenous, cond-mat/0204626 has already shown how this concept can be applied concretely to differentiate the effects on financial markets of the 11 September 2001 attack or of the coup against Gorbachev on 19 August 1991 (exogenous) from financial crashes such as October 1987 (endogenous).

  14. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Exogenous factors in panic disorder: clinical and research implications.

    Science.gov (United States)

    Roy-Byrne, P P; Uhde, T W

    1988-02-01

    Because panic disorder has an underlying biologic and probably genetic basis, the role of factors outside the organism in initiating and sustaining panic is often overlooked. The authors review certain exogenous factors that seem capable of triggering attacks and/or increasing their frequency and intensity: self-administered pharmacologic agents (caffeine, alcohol, nicotine, over-the-counter cold preparations, cannabis, cocaine); habits (sleep deprivation, diet, exercise, relaxation, hyperventilation); and aspects of the environment (fluorescent lighting, life stressors). There may be a specificity to the action of some of these factors, because certain factors previously thought to trigger panic attacks (e.g., pain, hypoglycemia) have been proved not to have this effect. Although the clinical significance of many of the exogenous factors discussed still awaits empirical confirmation, attention to such factors during the initial evaluation of a patient with panic disorder may be helpful in formulating a successful treatment plan.

  16. Genotoxicity test of irradiated foods

    International Nuclear Information System (INIS)

    Tanaka, Noriho

    2004-01-01

    Safety tests of radiation irradiated foods started as early as from 1967 in Japan and genotoxicity tests in the Hatano Res. Inst., from 1977. The latter is unique in the world and is reviewed in this paper. Tests included those for the initial injury of DNA, mutagenicity, chromosomal aberration and transformation with use of bacteria, cultured mammalian cells and animals (for chromosomal aberration, micronucleus formation and dominant lethality). Foods tested hitherto were onion, rice, wheat and flour, Vienna sausage, fish sausage (kamaboko), mandarian orange, potato, black pepper and red capsicum, of which extract or powder was subjected to the test. Irradiation doses and its purposes were 0.15-6 kGy γ-ray ( 60 Co) or electron beam by the accelerator (only for the orange), and suppression of germination, pesticide action or sterilization, respectively. Genotoxicity of all foods under tested conditions is shown negative. (N.I.)

  17. Urinary screening for potentially genotoxic exposures in a chemical industry

    Energy Technology Data Exchange (ETDEWEB)

    Ahlborg, G. Jr.; Bergstroem, B.H.; Hogstedt, C.; Einistoe, P.S.; Sorsa, M.

    1985-10-01

    Mutagenic activity, measured by the bacterial fluctuation assay and thioether concentration in urine from workers at a chemical plant producing pharmaceuticals and explosives, was determined before and after exposure. Of 12 groups only those exposed to trinitrotoluene (n = 14) showed a significant increase in mutagenic activity using Salmonella typhimurium TA 98 without any exogenous metabolic system. The same strain responded only weakly when the S-9 mix was used; with Escherichia coli WP2 uvrA no effect of exposure was observed. Urinary thioether concentration was higher among smokers than among non-smokers, but occupational exposure had no effect. Urinary mutagenicity testing may be a useful tool for screening potentially genotoxic exposures in complex chemical environments.

  18. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  19. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  20. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Genotoxic thresholds, DNA repair, and susceptibility in human populations

    International Nuclear Information System (INIS)

    Jenkins, Gareth J.S.; Zair, Zoulikha; Johnson, George E.; Doak, Shareen H.

    2010-01-01

    It has been long assumed that DNA damage is induced in a linear manner with respect to the dose of a direct acting genotoxin. Thus, it is implied that direct acting genotoxic agents induce DNA damage at even the lowest of concentrations and that no 'safe' dose range exists. The linear (non-threshold) paradigm has led to the one-hit model being developed. This 'one hit' scenario can be interpreted such that a single DNA damaging event in a cell has the capability to induce a single point mutation in that cell which could (if positioned in a key growth controlling gene) lead to increased proliferation, leading ultimately to the formation of a tumour. There are many groups (including our own) who, for a decade or more, have argued, that low dose exposures to direct acting genotoxins may be tolerated by cells through homeostatic mechanisms such as DNA repair. This argument stems from the existence of evolutionary adaptive mechanisms that allow organisms to adapt to low levels of exogenous sources of genotoxins. We have been particularly interested in the genotoxic effects of known mutagens at low dose exposures in human cells and have identified for the first time, in vitro genotoxic thresholds for several mutagenic alkylating agents (Doak et al., 2007). Our working hypothesis is that DNA repair is primarily responsible for these thresholded effects at low doses by removing low levels of DNA damage but becoming saturated at higher doses. We are currently assessing the roles of base excision repair (BER) and methylguanine-DNA methyltransferase (MGMT) for roles in the identified thresholds (Doak et al., 2008). This research area is currently important as it assesses whether 'safe' exposure levels to mutagenic chemicals can exist and allows risk assessment using appropriate safety factors to define such exposure levels. Given human variation, the mechanistic basis for genotoxic thresholds (e.g. DNA repair) has to be well defined in order that susceptible individuals are

  3. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  4. Toward a Genotoxic Protection Factor

    International Nuclear Information System (INIS)

    Cesarini, J.P.; Demanneville, S.

    2000-01-01

    P53, a molecule normally expressed before mitosis, is considered as the 'guardian of the genome'. In the skin its level is normally very low (<3% of cells), detected by immunohistochemical methods. At least 50% of the keratinocytes express p53 protein, 24 h following a significant UV irradiation (2 SED). It is expected using sunscreens to reduce the expression of p53 in parallel with their ability to reduce the actinic erythema, the endpoint adopted to evaluate the Sun Protection Factor (SPF) of sunscreens. P53 detection on biopsies performed on the buttocks of human volunteers was used to evaluate the genotoxic protecting factor (GPF) of several sunscreens with either high UVB filtration or high UVA filtration, characterised by various SPF (COLIPA) from 10 to 40. The p53 count in parallel with sunburn cell count were the parameters studied. In general, the GPF of the sunscreens was found below the proprietary SPF. If a genotoxic effect is shown in an increased p53 expression, this effect is still observed at a dose lower than the dose inducing the faintest actinic erythema. (author)

  5. Toward a Genotoxic Protection Factor

    Energy Technology Data Exchange (ETDEWEB)

    Cesarini, J.P.; Demanneville, S

    2000-07-01

    P53, a molecule normally expressed before mitosis, is considered as the 'guardian of the genome'. In the skin its level is normally very low (<3% of cells), detected by immunohistochemical methods. At least 50% of the keratinocytes express p53 protein, 24 h following a significant UV irradiation (2 SED). It is expected using sunscreens to reduce the expression of p53 in parallel with their ability to reduce the actinic erythema, the endpoint adopted to evaluate the Sun Protection Factor (SPF) of sunscreens. P53 detection on biopsies performed on the buttocks of human volunteers was used to evaluate the genotoxic protecting factor (GPF) of several sunscreens with either high UVB filtration or high UVA filtration, characterised by various SPF (COLIPA) from 10 to 40. The p53 count in parallel with sunburn cell count were the parameters studied. In general, the GPF of the sunscreens was found below the proprietary SPF. If a genotoxic effect is shown in an increased p53 expression, this effect is still observed at a dose lower than the dose inducing the faintest actinic erythema. (author)

  6. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  7. Decisions to regulate genotoxic substances

    Energy Technology Data Exchange (ETDEWEB)

    Bengtsson, G

    1988-07-01

    Decisions to regulate genotoxic substances involve trade-offs between various incomparable factors such as risks to human health and other environmental risks, public perceptions, costs and uncertainties. Two different approaches towards these trade-offs are discussed. In one approach, all relevant factors are defined and trade-offs are considered using a general and very elaborate analysis. Cost-benefit analysis is an exponent of this approach. An illustration is given for the regulation of transboundary releases of radioactive materials. The other approach considers what is politically feasible for the time being and seeks a decision with much room for later corrections. Incrementalism is a philosophy in this vein. It is illustrated by reference to the regulation of transboundary air pollution. Weaknesses and strengths of the two approaches are discussed. (author)

  8. Decisions to regulate genotoxic substances

    International Nuclear Information System (INIS)

    Bengtsson, G.

    1988-01-01

    Decisions to regulate genotoxic substances involve trade-offs between various incomparable factors such as risks to human health and other environmental risks, public perceptions, costs and uncertainties. Two different approaches towards these trade-offs are discussed. In one approach, all relevant factors are defined and trade-offs are considered using a general and very elaborate analysis. Cost-benefit analysis is an exponent of this approach. An illustration is given for the regulation of transboundary releases of radioactive materials. The other approach considers what is politically feasible for the time being and seeks a decision with much room for later corrections. Incrementalism is a philosophy in this vein. It is illustrated by reference to the regulation of transboundary air pollution. Weaknesses and strengths of the two approaches are discussed. (author)

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  13. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  14. Consequences and detection of invalid exogeneity conditions

    NARCIS (Netherlands)

    Niemczyk, J.

    2009-01-01

    Estimators for econometric relationships require observations on at least as many exogenous variables as the model has unknown coefficients. This thesis examines techniques to classify variables as being either exogenous or endogenous, and investigates the consequences of invalid classifications.

  15. Genotoxic effects of environmental pollutants genotoxic monitoring and detection of antigenotoxic effects

    International Nuclear Information System (INIS)

    Simic, D.; Knezevic-Vukcevic, J.; Vukovi -Gacic, B.; Mitic, D.; Beric, T.; Nikolic, B.; Stanojevic, J.; Stankovic, S.

    2002-01-01

    The control of genotoxic agents mass release, which can adversely affect the ecosystem stability and human health is of the greatest importance. Therefore, it is necessary to seriously elaborate the strategy of genotoxic monitoring and relevant legislation. Additional approach is the study and dietary use of antigenotoxic plant substances for prevention of mutation-related diseases. (author)

  16. Genotoxic effects of environmental pollutants genotoxic monitoring and detection of antigenotoxic effects

    Energy Technology Data Exchange (ETDEWEB)

    Simic, D; Knezevic-Vukcevic, J; Vukovi -Gacic, B; Mitic, D; Beric, T; Nikolic, B; Stanojevic, J; Stankovic, S [Faculty of Biology, University of Belgrade, Belgrade (Yugoslavia)

    2002-05-01

    The control of genotoxic agents mass release, which can adversely affect the ecosystem stability and human health is of the greatest importance. Therefore, it is necessary to seriously elaborate the strategy of genotoxic monitoring and relevant legislation. Additional approach is the study and dietary use of antigenotoxic plant substances for prevention of mutation-related diseases. (author)

  17. Exogenic and endogenic Europa minerals

    Science.gov (United States)

    Maynard-Casely, H. E.; Brand, H. E. A.; Wilson, S. A.

    2016-12-01

    The Galileo Near Infrared Mapping Spectrometer (NIMS) identified a significant `non-ice' component upon the surface of Jupiter's moon Europa. Current explanations invoke both endogenic and exogenic origins for this material. It has long been suggested that magnesium and sodium sulfate minerals could have leached from the rock below a putative ocean (endogenic) 1 and that sulfuric acid hydrate minerals could have been radiologically produced from ionised sulfur originally from Io's volcanoes (exogenic) 2. However, a more recent theory proposes that the `non-ice' component could be radiation damaged NaCl leached from Europa's speculative ocean 3. What if the minerals are actually from combination of both endogenic and exogenic sources? To investigate this possibility we have focused on discovering new minerals that might form in the combination of the latter two cases, that is a mixture of leached sulfates hydrates with radiologically produced sulfuric acid. To this end we have explored a number of solutions in the MgSO4-H2SO4-H2O and Na2SO4-H2SO4-H2O systems, between 80 and 280 K with synchrotron x-ray powder diffraction. We report a number of new materials formed in this these ternary systems. This suggests that it should be considered that the `non-ice' component of the Europa's surface could be a material derived from endogenic and exogenic components. 1 Kargel, J. S. Brine volcanism and the interior structures of asteroids and icy satellites. Icarus 94, 368-390 (1991). 2 Carlson, R. W., Anderson, M. S., Mehlman, R. & Johnson, R. E. Distribution of hydrate on Europa: Further evidence for sulfuric acid hydrate. Icarus 177, 461-471, doi:10.1016/j.icarus.2005.03.026 (2005). 3 Hand, K. P. & Carlson, R. W. Europa's surface color suggests an ocean rich with sodium chloride. Geophysical Research Letters, 2015GL063559, doi:10.1002/2015gl063559 (2015).

  18. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  19. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  1. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  2. GENOTOXICITY OF TOBACCO SMOKE AND TOBACCO SMOKE CONDENSATE: A REVIEW

    Science.gov (United States)

    Genotoxicity of Tobacco Smoke and Tobacco Smoke Condensate: A ReviewAbstractThis report reviews the literature on the genotoxicity of main-stream tobacco smoke and cigarette smoke condensate (CSC) published since 1985. CSC is genotoxic in nearly all systems in which it h...

  3. Assessment of mutagenic, antimutagenic and genotoxicity effects of Mimosa tenuiflora

    Directory of Open Access Journals (Sweden)

    Viviane A. Silva

    2013-02-01

    Full Text Available Genotoxic effects of Mimosa tenuiflora (Willd. Poir, Fabaceae, were investigated by using both micronucleus test and bacterial reverse mutation assay in Salmonella typhimurium TA97, TA98, TA100, TA102 respectively. In respect of Ames test results show that the extract does not induce mutations in any strains of Salmonella typhimurium tested since the mutagenicity index is less than 2. In the antimutagenic effect was observed that the extract at the concentrations tested significantly decreased the mutagenicity index of all strains tested which characterized the extract as antimutagenic in these conditions. In the micronucleus test in vivo, we observed that the concentrations used did not induce an increase in the frequency of micronucleus in normochromatic erythrocytes of mice. Therefore, we concluded that the extract of M. tenuiflora is not mutagenic in the absence of exogenous metabolizing system and does not induce an increase in the frequency of the micronucleus characterized as an agent not mutagenic in these conditions. Further studies of toxicity need to be made to the use of this plant in the treatment of diseases to be stimulated.

  4. Assessment of mutagenic, antimutagenic and genotoxicity effects of Mimosa tenuiflora

    Directory of Open Access Journals (Sweden)

    Viviane A. Silva

    2013-04-01

    Full Text Available Genotoxic effects of Mimosa tenuiflora (Willd. Poir, Fabaceae, were investigated by using both micronucleus test and bacterial reverse mutation assay in Salmonella typhimurium TA97, TA98, TA100, TA102 respectively. In respect of Ames test results show that the extract does not induce mutations in any strains of Salmonella typhimurium tested since the mutagenicity index is less than 2. In the antimutagenic effect was observed that the extract at the concentrations tested significantly decreased the mutagenicity index of all strains tested which characterized the extract as antimutagenic in these conditions. In the micronucleus test in vivo, we observed that the concentrations used did not induce an increase in the frequency of micronucleus in normochromatic erythrocytes of mice. Therefore, we concluded that the extract of M. tenuiflora is not mutagenic in the absence of exogenous metabolizing system and does not induce an increase in the frequency of the micronucleus characterized as an agent not mutagenic in these conditions. Further studies of toxicity need to be made to the use of this plant in the treatment of diseases to be stimulated.

  5. Genotoxic evaluation of polymeric nanoparticles

    Directory of Open Access Journals (Sweden)

    Tamara Iglesias Alonso

    2015-06-01

    Full Text Available An important strategy for optimizing the therapeutic efficacy of many conventional drugs is the development of polymeric nanoparticles (NPs, as it may expand their activities, reduce their toxicity, increase their bioactivity and improve biodistribution. The main objective of this study was to evaluate the genotoxicity of 8 different poly (anhydride NPs designed for the oral administration of therapeutic compounds by using the comet assay in combination with the enzyme formamidopypiridine DNA-glycosylase (FPG. Furthermore, the mitogen capacity of the NPs was evaluated by the proliferation assay. All NPs were tested at four concentrations (0, 0.5, 1 and 2 mg/mL in Caco-2 cells after 3 hours of treatment while selected NPs were also tested after 24 h. The comet assay was performed immediately after the treatment and cell proliferation was assessed by counting the treated cells after their incubation at 37 °C for 48h. Cells treated with 1 µM of the photosensitizer Ro 19-8022 plus 5 min of light, as well as cells treated with 100 µM H2O2 were included as positive controls in all the experiments. All NPs studied did not result in any increase in the frequency of strand breaks or alkali-labile sites in Caco-2 cells but they induced a slight concentration-dependent increase in net FPG sensitive sites (oxidized and/or alkylated bases. Furthermore, treated cells did not show changes in levels of proliferation in comparison with the negative control.

  6. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  7. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  8. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  9. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  10. Exogenous salicylic acid enhances the resistance of wheat seedlings to hessian fly (Diptera: Cecidomyiidae) infestation under heat stress

    Science.gov (United States)

    Heat stress exerts significant impact on plant-parasite interactions. Phytohormones, such as salicylic acid (SA) play important roles in plant defense against parasite attacks. Here we studied the impact of a combination of heat stress and exogenous SA on wheat (Triticum aestivum L.) plant resistanc...

  11. A novel mechanism of oxidative genotoxicity

    Indian Academy of Sciences (India)

    The genotoxicity of reactive oxygen species (ROS) is well established. The underlying mechanism involves oxidation of DNA by ROS. However, we have recently shown that hydrogen peroxide (H2O2), the major mediator of oxidative stress, can also cause genomic damage indirectly. Thus, H2O2 at pathologically relevant ...

  12. Comparative Physicochemical and Genotoxicity Assessments of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    ABSTRACT: The textile industry has become indispensable in view of its basic and social importance to human life, but its environmental impact has continued to be a subject of concern. ... the economy of many countries. ... Textile and clothing production process ..... Genotoxicity screening of industrial effluents using.

  13. "Aspartame: A review of genotoxicity data".

    Science.gov (United States)

    Kirkland, David; Gatehouse, David

    2015-10-01

    Aspartame is a methyl ester of a dipeptide of aspartic acid and phenylalanine. It is 200× sweeter than sucrose and is approved for use in food products in more than 90 countries around the world. Aspartame has been evaluated for genotoxic effects in microbial, cell culture and animal models, and has been subjected to a number of carcinogenicity studies. The in vitro and in vivo genotoxicity data available on aspartame are considered sufficient for a thorough evaluation. There is no evidence of induction of gene mutations in a series of bacterial mutation tests. There is some evidence of induction of chromosomal damage in vitro, but this may be an indirect consequence of cytotoxicity. The weight of evidence from in vivo bone marrow micronucleus, chromosomal aberration and Comet assays is that aspartame is not genotoxic in somatic cells in vivo. The results of germ cell assays are difficult to evaluate considering limited data available and deviations from standard protocols. The available data therefore support the conclusions of the European Food Safety Authority (EFSA) that aspartame is non-genotoxic. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. Contributions of DNA repair and damage response pathways to the non-linear genotoxic responses of alkylating agents.

    Science.gov (United States)

    Klapacz, Joanna; Pottenger, Lynn H; Engelward, Bevin P; Heinen, Christopher D; Johnson, George E; Clewell, Rebecca A; Carmichael, Paul L; Adeleye, Yeyejide; Andersen, Melvin E

    2016-01-01

    From a risk assessment perspective, DNA-reactive agents are conventionally assumed to have genotoxic risks at all exposure levels, thus applying a linear extrapolation for low-dose responses. New approaches discussed here, including more diverse and sensitive methods for assessing DNA damage and DNA repair, strongly support the existence of measurable regions where genotoxic responses with increasing doses are insignificant relative to control. Model monofunctional alkylating agents have in vitro and in vivo datasets amenable to determination of points of departure (PoDs) for genotoxic effects. A session at the 2013 Society of Toxicology meeting provided an opportunity to survey the progress in understanding the biological basis of empirically-observed PoDs for DNA alkylating agents. Together with the literature published since, this review discusses cellular pathways activated by endogenous and exogenous alkylation DNA damage. Cells have evolved conserved processes that monitor and counteract a spontaneous steady-state level of DNA damage. The ubiquitous network of DNA repair pathways serves as the first line of defense for clearing of the DNA damage and preventing mutation. Other biological pathways discussed here that are activated by genotoxic stress include post-translational activation of cell cycle networks and transcriptional networks for apoptosis/cell death. The interactions of various DNA repair and DNA damage response pathways provide biological bases for the observed PoD behaviors seen with genotoxic compounds. Thus, after formation of DNA adducts, the activation of cellular pathways can lead to the avoidance of a mutagenic outcome. The understanding of the cellular mechanisms acting within the low-dose region will serve to better characterize risks from exposures to DNA-reactive agents at environmentally-relevant concentrations. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Contributions of DNA repair and damage response pathways to the non-linear genotoxic responses of alkylating agents

    Science.gov (United States)

    Klapacz, Joanna; Pottenger, Lynn H.; Engelward, Bevin P.; Heinen, Christopher D.; Johnson, George E.; Clewell, Rebecca A.; Carmichael, Paul L.; Adeleye, Yeyejide; Andersen, Melvin E.

    2016-01-01

    From a risk assessment perspective, DNA-reactive agents are conventionally assumed to have genotoxic risks at all exposure levels, thus applying a linear extrapolation for low-dose responses. New approaches discussed here, including more diverse and sensitive methods for assessing DNA damage and DNA repair, strongly support the existence of measurable regions where genotoxic responses with increasing doses are insignificant relative to control. Model monofunctional alkylating agents have in vitro and in vivo datasets amenable to determination of points of departure (PoDs) for genotoxic effects. A session at the 2013 Society of Toxicology meeting provided an opportunity to survey the progress in understanding the biological basis of empirically-observed PoDs for DNA alkylating agents. Together with the literature published since, this review discusses cellular pathways activated by endogenous and exogenous alkylation DNA damage. Cells have evolved conserved processes that monitor and counteract a spontaneous steady-state level of DNA damage. The ubiquitous network of DNA repair pathways serves as the first line of defense for clearing of the DNA damage and preventing mutation. Other biological pathways discussed here that are activated by genotoxic stress include post-translational activation of cell cycle networks and transcriptional networks for apoptosis/cell death. The interactions of various DNA repair and DNA damage response pathways provide biological bases for the observed PoD behaviors seen with genotoxic compounds. Thus, after formation of DNA adducts, the activation of cellular pathways can lead to the avoidance a mutagenic outcome. The understanding of the cellular mechanisms acting within the low-dose region will serve to better characterize risks from exposures to DNA-reactive agents at environmentally-relevant concentrations. PMID:27036068

  16. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  17. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  18. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Exogenous melatonin administration is beneficial for male ...

    African Journals Online (AJOL)

    ABSTRACT. Background: A concern in the use of exogenous melatonin as a therapeutic intervention is that it may interfere with reproductive function. Herein, we report that chronic exogenous melatonin administration does not impair male reproductive function during ageing and at old age in male Sprague Dawley rats.

  1. Exogenous melatonin administration is beneficial for male ...

    African Journals Online (AJOL)

    Background: A concern in the use of exogenous melatonin as a therapeutic intervention is that it may interfere with reproductive function. Herein, we report that chronic exogenous melatonin administration does not impair male reproductive function during ageing and at old age in male Sprague Dawley rats. Methods: ...

  2. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  3. Exogenous fatty acid metabolism in bacteria.

    Science.gov (United States)

    Yao, Jiangwei; Rock, Charles O

    2017-10-01

    Bacterial type II fatty acid synthesis (FASII) is a target for novel antibiotic development. All bacteria encode for mechanisms to incorporate exogenous fatty acids, and some bacteria can use exogenous fatty acids to bypass FASII inhibition. Bacteria encode three different mechanisms for activating exogenous fatty acids for incorporation into phospholipid synthesis. Exogenous fatty acids are converted into acyl-CoA in Gammaproteobacteria such as E. coli. Acyl-CoA molecules constitute a separate pool from endogenously synthesized acyl-ACP. Acyl-CoA can be used for phospholipid synthesis or broken down by β-oxidation, but cannot be used for lipopolysaccharide synthesis. Exogenous fatty acids are converted into acyl-ACP in some Gram-negative bacteria. The resulting acyl-ACP undergoes the same fates as endogenously synthesized acyl-ACP. Exogenous fatty acids are converted into acyl-phosphates in Gram-positive bacteria, and can be used for phospholipid synthesis or become acyl-ACP. Only the order Lactobacillales can use exogenous fatty acids to bypass FASII inhibition. FASII shuts down completely in presence of exogenous fatty acids in Lactobacillales, allowing Lactobacillales to synthesize phospholipids entirely from exogenous fatty acids. Inhibition of FASII cannot be bypassed in other bacteria because FASII is only partially down-regulated in presence of exogenous fatty acid or FASII is required to synthesize essential metabolites such as β-hydroxyacyl-ACP. Certain selective pressures such as FASII inhibition or growth in biofilms can select for naturally occurring one step mutations that attenuate endogenous fatty acid synthesis. Although attempts have been made to estimate the natural prevalence of these mutants, culture-independent metagenomic methods would provide a better estimate. Copyright © 2017 Elsevier B.V. and Société Française de Biochimie et Biologie Moléculaire (SFBBM). All rights reserved.

  4. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  5. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  6. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  7. Ecotoxicity and genotoxicity assessment of cytostatic pharmaceuticals

    Czech Academy of Sciences Publication Activity Database

    Zounková, R.; Odráška, P.; Doležalová, L.; Hilscherová, Klára; Maršálek, Blahoslav; Bláha, Luděk

    2007-01-01

    Roč. 26, č. 10 (2007), s. 2208-2214 ISSN 0730-7268 Grant - others:GA MŠk(CZ) 2B06171; ECODIS(XE) 518043-1 Institutional research plan: CEZ:AV0Z60050516 Source of funding: R - rámcový projekt EK Keywords : cytostatic pharmaceuticals * genotoxicity * antineoplastics Subject RIV: EF - Botanics Impact factor: 2.309, year: 2007

  8. Genoprotective and Genotoxic Effects of Thymoquinone on ...

    African Journals Online (AJOL)

    Comet assays and apoptotic cell studies were performed to evaluate the effect of TQ on the cytotoxicity and genotoxicity-induced by DXR. Results: TQ treatment, alone, (5.0, 10, or 20 µM) increased DNA damage index (DI) in a concentrationdependent manner (0.64 ± 0.09, 0.84 ± 0.07, and 0.93 ± 0.06, respectively).

  9. Cytotoxicity and genotoxicity of biogenic silver nanoparticles

    International Nuclear Information System (INIS)

    Lima, R; Feitosa, L O; Ballottin, D; Tasic, L; Durán, N; Marcato, P D

    2013-01-01

    Biogenic silver nanoparticles with 40.3 ± 3.5 nm size and negative surface charge (− 40 mV) were prepared with Fusarium oxysporum. The cytotoxicity of 3T3 cell and human lymphocyte were studied by a TaliTM image-based cytometer and the genotoxicity through Allium cepa and comet assay. The results of BioAg-w (washed) and BioAg-nw (unwashed) biogenic silver nanoparticles showed cytotoxicity exceeding 50 μg/mL with no significant differences of response in 5 and 10 μg/mL regarding viability. Results of genotoxicity at concentrations 5.0 and 10.0 ug/mL show some response, but at concentrations 0.5 and 1.0 μg/mL the washed and unwashed silver nanoparticles did not present any effect. This in an important result since in tests with different bacteria species and strains, including resistant, MIC (minimal inhibitory concentration) had good answers at concentrations less than 1.9 μg/mL. This work concludes that biogenic silver nanoparticles may be a promising option for antimicrobial use in the range where no cyto or genotoxic effect were observed. Furthermore, human cells were found to have a greater resistance to the toxic effects of silver nanoparticles in comparison with other cells.

  10. METABOLISM, GENOTOXICITY, AND CARCINOGENICITY OF COMFREY

    Science.gov (United States)

    Mei, Nan; Guo, Lei; Fu, Peter P.; Fuscoe, James C.; Luan, Yang; Chen, Tao

    2018-01-01

    Comfrey has been consumed by humans as a vegetable and a tea and used as an herbal medicine for more than 2000 years. Comfrey, however, produces hepatotoxicity in livestock and humans and carcinogenicity in experimental animals. Comfrey contains as many as 14 pyrrolizidine alkaloids (PA), including 7-acetylintermedine, 7-acetyllycopsamine, echimidine, intermedine, lasiocarpine, lycopsamine, myoscorpine, symlandine, symphytine, and symviridine. The mechanisms underlying comfrey-induced genotoxicity and carcinogenicity are still not fully understood. The available evidence suggests that the active metabolites of PA in comfrey interact with DNA in liver endothelial cells and hepatocytes, resulting in DNA damage, mutation induction, and cancer development. Genotoxicities attributed to comfrey and riddelliine (a representative genotoxic PA and a proven rodent mutagen and carcinogen) are discussed in this review. Both of these compounds induced similar profiles of 6,7-dihydro-7-hydroxy-1-hydroxymethyl-5H-pyrrolizine (DHP)-derived DNA adducts and similar mutation spectra. Further, the two agents share common mechanisms of drug metabolism and carcinogenesis. Overall, comfrey is mutagenic in liver, and PA contained in comfrey appear to be responsible for comfrey-induced toxicity and tumor induction. PMID:21170807

  11. Metabolism, genotoxicity, and carcinogenicity of comfrey.

    Science.gov (United States)

    Mei, Nan; Guo, Lei; Fu, Peter P; Fuscoe, James C; Luan, Yang; Chen, Tao

    2010-10-01

    Comfrey has been consumed by humans as a vegetable and a tea and used as an herbal medicine for more than 2000 years. Comfrey, however, produces hepatotoxicity in livestock and humans and carcinogenicity in experimental animals. Comfrey contains as many as 14 pyrrolizidine alkaloids (PA), including 7-acetylintermedine, 7-acetyllycopsamine, echimidine, intermedine, lasiocarpine, lycopsamine, myoscorpine, symlandine, symphytine, and symviridine. The mechanisms underlying comfrey-induced genotoxicity and carcinogenicity are still not fully understood. The available evidence suggests that the active metabolites of PA in comfrey interact with DNA in liver endothelial cells and hepatocytes, resulting in DNA damage, mutation induction, and cancer development. Genotoxicities attributed to comfrey and riddelliine (a representative genotoxic PA and a proven rodent mutagen and carcinogen) are discussed in this review. Both of these compounds induced similar profiles of 6,7-dihydro-7-hydroxy-1-hydroxymethyl-5H-pyrrolizine (DHP)-derived DNA adducts and similar mutation spectra. Further, the two agents share common mechanisms of drug metabolism and carcinogenesis. Overall, comfrey is mutagenic in liver, and PA contained in comfrey appear to be responsible for comfrey-induced toxicity and tumor induction.

  12. Interplay between Ubiquitin, SUMO, and Poly(ADP-Ribose) in the Cellular Response to Genotoxic Stress

    Science.gov (United States)

    Pellegrino, Stefania; Altmeyer, Matthias

    2016-01-01

    Cells employ a complex network of molecular pathways to cope with endogenous and exogenous genotoxic stress. This multilayered response ensures that genomic lesions are efficiently detected and faithfully repaired in order to safeguard genome integrity. The molecular choreography at sites of DNA damage relies heavily on post-translational modifications (PTMs). Protein modifications with ubiquitin and the small ubiquitin-like modifier SUMO have recently emerged as important regulatory means to coordinate DNA damage signaling and repair. Both ubiquitylation and SUMOylation can lead to extensive chain-like protein modifications, a feature that is shared with yet another DNA damage-induced PTM, the modification of proteins with poly(ADP-ribose) (PAR). Chains of ubiquitin, SUMO, and PAR all contribute to the multi-protein assemblies found at sites of DNA damage and regulate their spatio-temporal dynamics. Here, we review recent advancements in our understanding of how ubiquitin, SUMO, and PAR coordinate the DNA damage response and highlight emerging examples of an intricate interplay between these chain-like modifications during the cellular response to genotoxic stress. PMID:27148359

  13. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  14. Detection of genotoxic and non-genotoxic carcinogens in Xpc−/−p53+/− mice

    International Nuclear Information System (INIS)

    Melis, Joost P.M.; Speksnijder, Ewoud N.; Kuiper, Raoul V.; Salvatori, Daniela C.F.; Schaap, Mirjam M.; Maas, Saskia; Robinson, Joke; Verhoef, Aart; Benthem, Jan van; Luijten, Mirjam; Steeg, Harry van

    2013-01-01

    An accurate assessment of the carcinogenic potential of chemicals and pharmaceutical drugs is essential to protect humans and the environment. Therefore, substances are extensively tested before they are marketed to the public. Currently, the rodent two-year bioassay is still routinely used to assess the carcinogenic potential of substances. However, over time it has become clear that this assay yields false positive results and also has several economic and ethical drawbacks including the use of large numbers of animals, the long duration, and the high cost. The need for a suitable alternative assay is therefore high. Previously, we have proposed the Xpa*p53 mouse model as a very suitable alternative to the two-year bioassay. We now show that the Xpc*p53 mouse model preserves all the beneficial traits of the Xpa*p53 model for sub-chronic carcinogen identification and can identify both genotoxic and non-genotoxic carcinogens. Moreover, Xpc*p53 mice appear to be more responsive than Xpa*p53 mice towards several genotoxic and non-genotoxic carcinogens. Furthermore, Xpc*p53 mice are far less sensitive than Xpa*p53 mice for the toxic activity of DNA damaging agents and as such clearly respond in a similar way as wild type mice do. These advantageous traits of the Xpc*p53 model make it a better alternative for in vivo carcinogen testing than Xpa*p53. This pilot study suggests that Xpc*p53 mice are suited for routine sub-chronic testing of both genotoxic and non-genotoxic carcinogens and as such represent a suitable alternative to possibly replace the murine life time cancer bioassay. Highlights: ► The Xpc*p53 mouse model is able to identify genotoxic and non-genotoxic carcinogens. ► Time, animals and cost can be significantly reduced compared to the 2-year bioassay. ► Xpc*p53 mice are more advantageous for carcinogen identification than Xpa*p53 mice. ► Xpc*p53 mice exhibit a wild type response upon exposure to genotoxicants.

  15. A predictive toxicogenomics signature to classify genotoxic versus non-genotoxic chemicals in human TK6 cells

    Directory of Open Access Journals (Sweden)

    Andrew Williams

    2015-12-01

    Full Text Available Genotoxicity testing is a critical component of chemical assessment. The use of integrated approaches in genetic toxicology, including the incorporation of gene expression data to determine the DNA damage response pathways involved in response, is becoming more common. In companion papers previously published in Environmental and Molecular Mutagenesis, Li et al. (2015 [6] developed a dose optimization protocol that was based on evaluating expression changes in several well-characterized stress-response genes using quantitative real-time PCR in human lymphoblastoid TK6 cells in culture. This optimization approach was applied to the analysis of TK6 cells exposed to one of 14 genotoxic or 14 non-genotoxic agents, with sampling 4 h post-exposure. Microarray-based transcriptomic analyses were then used to develop a classifier for genotoxicity using the nearest shrunken centroids method. A panel of 65 genes was identified that could accurately classify toxicants as genotoxic or non-genotoxic. In Buick et al. (2015 [1], the utility of the biomarker for chemicals that require metabolic activation was evaluated. In this study, TK6 cells were exposed to increasing doses of four chemicals (two genotoxic that require metabolic activation and two non-genotoxic chemicals in the presence of rat liver S9 to demonstrate that S9 does not impair the ability to classify genotoxicity using this genomic biomarker in TK6cells.

  16. Using synergistic exogenous phytohormones to enhance somatic ...

    African Journals Online (AJOL)

    Southern Forests: a Journal of Forest Science ... Eucalyptus spp. has been limited to germinated seeds, flowers, lignotubers or zygotic embryos. ... explants could be enhanced through pairing of synergistic exogenous plant growth regulators, ...

  17. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  18. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  19. Visible propagation from invisible exogenous cueing.

    Science.gov (United States)

    Lin, Zhicheng; Murray, Scott O

    2013-09-20

    Perception and performance is affected not just by what we see but also by what we do not see-inputs that escape our awareness. While conscious processing and unconscious processing have been assumed to be separate and independent, here we report the propagation of unconscious exogenous cueing as determined by conscious motion perception. In a paradigm combining masked exogenous cueing and apparent motion, we show that, when an onset cue was rendered invisible, the unconscious exogenous cueing effect traveled, manifesting at uncued locations (4° apart) in accordance with conscious perception of visual motion; the effect diminished when the cue-to-target distance was 8° apart. In contrast, conscious exogenous cueing manifested in both distances. Further evidence reveals that the unconscious and conscious nonretinotopic effects could not be explained by an attentional gradient, nor by bottom-up, energy-based motion mechanisms, but rather they were subserved by top-down, tracking-based motion mechanisms. We thus term these effects mobile cueing. Taken together, unconscious mobile cueing effects (a) demonstrate a previously unknown degree of flexibility of unconscious exogenous attention; (b) embody a simultaneous dissociation and association of attention and consciousness, in which exogenous attention can occur without cue awareness ("dissociation"), yet at the same time its effect is contingent on conscious motion tracking ("association"); and (c) underscore the interaction of conscious and unconscious processing, providing evidence for an unconscious effect that is not automatic but controlled.

  20. Is Money Really Exogenous? Testing for Weak Exogeneity in Swiss Money Demand.

    OpenAIRE

    Fischer, Andreas M

    1993-01-01

    Although exogeneity is often associated with controllable policy variables, Engle, Hendry, and Richard (1983) show that the one condition is neither necessary nor sufficient for the other. Whether variables such as monetary aggregates are (weakly) exogenous depends on the conditioning properties of the data generating process. Testing exogeneity claims represents an important step in analyzing money demand functions. Although Switzerland adheres to fairly strict monetarist prescriptions, we r...

  1. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  2. Considerations on photochemical genotoxicity. II: Report of the 2009 International Workshop on Genotoxicity Testing Working Group

    NARCIS (Netherlands)

    Lynch, A.M.; Guzzie, P.J.; Bauer, D.; Gocke, E.; Itoh, S.; Jacobs, A.; Krul, C.A.M.; Schepky, A.; Tanaka, N.; Kasper, P.

    2011-01-01

    A workshop to reappraise the previous IWGT recommendations for photogenotoxicity testing [E. Gocke, L. Muller, P.J. Guzzie, S. Brendler-Schwaab, S. Bulera, C.F. Chignell, L.M. Henderson, A. Jacobs, H. Murli, R.D. Snyder, N. Tanaka, Considerations on photochemical genotoxicity: report of the

  3. Genotoxicity evaluation of the insecticide ethion in root of Allium ...

    African Journals Online (AJOL)

    USER

    2010-07-05

    Jul 5, 2010 ... In this study, the genotoxic effects of ethion were investigated in the mitotic cell division of Allium ... The use of plant root tips, particularly those of A. cepa and Vicia faba, as a bioassay test system for the genotoxicity of pesticides has shown extremely ..... the long run, even below the recommended dose.

  4. Chlorination of tramadol: Reaction kinetics, mechanism and genotoxicity evaluation.

    Science.gov (United States)

    Cheng, Hanyang; Song, Dean; Chang, Yangyang; Liu, Huijuan; Qu, Jiuhui

    2015-12-01

    Tramadol (TRA) is one of the most detected analgesics in environmental matrices, and it is of high significance to study the reactivity of TRA during chlorination considering its potential toxicity to the environment. The chlorine/TRA reaction is first order with respect to the TRA concentration, and a combination of first-order and second-order with respect to chlorine concentration. The pH dependence of the observed rate constants (kobs) showed that the TRA oxidation reactivity increased with increasing pH. kobs can be quantitatively described by considering all active species including Cl2, Cl2O and HOCl, and the individual rate constants of HOCl/TRA(0), HOCl/TRAH(+), Cl2/TRA and Cl2O/TRA reactions were calculated to be (2.61±0.29)×10(3)M(-1)s(-1), 14.73±4.17M(-1)s(-1), (3.93±0.34)×10(5)M(-1)s(-1) and (5.66±1.83)×10(6)M(-1)s(-1), respectively. Eleven degradation products were detected with UPLC-Q-TOF-MS, and the corresponding structures of eight products found under various pH conditions were proposed. The amine group was proposed to be the initial attack site under alkaline pH conditions, where reaction of the deprotonated amine group with HOCl is favorable. Under acidic and neutral pH conditions, however, two possible reaction pathways were proposed. One is an electrophilic substitution on the aromatic ring, and another is an electrophilic substitution on the nitrogen, leading to an N-chlorinated intermediate, which can be further oxidized. Finally, the SOS/umu test showed that the genotoxicity of TRA chlorination products increased with increasing dosage of chlorine, which was mostly attributed to the formation of some chlorine substitution products. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Evaluation of the genotoxicity of cellulose nanofibers.

    Science.gov (United States)

    de Lima, Renata; Oliveira Feitosa, Leandro; Rodrigues Maruyama, Cintia; Abreu Barga, Mariana; Yamawaki, Patrícia Cristina; Vieira, Isolda Jesus; Teixeira, Eliangela M; Corrêa, Ana Carolina; Caparelli Mattoso, Luiz Henrique; Fernandes Fraceto, Leonardo

    2012-01-01

    Agricultural products and by products provide the primary materials for a variety of technological applications in diverse industrial sectors. Agro-industrial wastes, such as cotton and curaua fibers, are used to prepare nanofibers for use in thermoplastic films, where they are combined with polymeric matrices, and in biomedical applications such as tissue engineering, amongst other applications. The development of products containing nanofibers offers a promising alternative for the use of agricultural products, adding value to the chains of production. However, the emergence of new nanotechnological products demands that their risks to human health and the environment be evaluated. This has resulted in the creation of the new area of nanotoxicology, which addresses the toxicological aspects of these materials. Contributing to these developments, the present work involved a genotoxicological study of different nanofibers, employing chromosomal aberration and comet assays, as well as cytogenetic and molecular analyses, to obtain preliminary information concerning nanofiber safety. The methodology consisted of exposure of Allium cepa roots, and animal cell cultures (lymphocytes and fibroblasts), to different types of nanofibers. Negative controls, without nanofibers present in the medium, were used for comparison. The nanofibers induced different responses according to the cell type used. In plant cells, the most genotoxic nanofibers were those derived from green, white, and brown cotton, and curaua, while genotoxicity in animal cells was observed using nanofibers from brown cotton and curaua. An important finding was that ruby cotton nanofibers did not cause any significant DNA breaks in the cell types employed. This work demonstrates the feasibility of determining the genotoxic potential of nanofibers derived from plant cellulose to obtain information vital both for the future usage of these materials in agribusiness and for an understanding of their environmental

  6. Cells behaviors and genotoxicity on topological surface

    International Nuclear Information System (INIS)

    Yang, N.; Yang, M.K.; Bi, S.X.; Chen, L.; Zhu, Z.Y.; Gao, Y.T.; Du, Z.

    2013-01-01

    To investigate different cells behaviors and genotoxicity, which were driven by specific microenvironments, three patterned surfaces (pillars, wide grooves and narrow grooves) and one smooth surface were prepared by template-based technique. Vinculin is a membrane-cytoskeletal protein in focal adhesion plaques and associates with cell–cell and cell–matrix junctions, which can promote cell adhesion and spreading. The immunofluorescence staining of vinculin revealed that the narrow grooves patterned substrate was favorable for L929 cell adhesion. For cell multiplication, the narrow grooves surface was fitted for the proliferation of L929, L02 and MSC cells, the pillars surface was only in favor of L929 cells to proliferate during 7 days of cell cultivation. Cell genetic toxicity was evaluated by cellular micronuclei test (MNT). The results indicated that topological surfaces were more suitable for L929 cells to proliferate and maintain the stability of genome. On the contrary, the narrow grooves surface induced higher micronuclei ratio of L02 and MSC cells than other surfaces. With the comprehensive results of cell multiplication and MNT, it was concluded that the wide grooves surface was best fitted for L02 cells to proliferate and have less DNA damages, and the smooth surface was optimum for the research of MSC cells in vitro. - Highlights: • Different cells behaviors on microstructure surfaces were discussed in this paper. • The expression of cell protein of Vinculin was studied in this research. • Cellular micronuclei test was applied to evaluate cells' genotoxicity. • Cell genotoxicity was first studied in the research field of topological surfaces

  7. Human biological monitoring of occupational genotoxic exposures

    DEFF Research Database (Denmark)

    Knudsen, Lisbeth E.; Sorsa, M

    1993-01-01

    Human biological monitoring is a valuable tool for exposure assessment in groups of persons occupationally exposed to genotoxic agents. If the monitoring activity covers genetic material the term genetic monitoring is used. The methods used for genetic monitoring are either substance specific, e......) occupational exposure limit value of styrene in ambient air. The consideration of ethical issues in human genetic monitoring is an important but often overlooked aspect. This includes the scientific and preventional relevance of performing a test on individuals, pre- and post study information of donors...

  8. Evaluation of perfluorooctanoate for potential genotoxicity

    Directory of Open Access Journals (Sweden)

    John L. Butenhoff

    2014-01-01

    Full Text Available Perfluorooctanoate (PFOA is a fully fluorinated eight-carbon fatty acid analog with exceptional stability toward degradation that has been used as an industrial surfactant and has been detected in environmental and biological matrices. Exposures to PFOA in the workplace and in the environment have continuously stimulated investigations into its potential human health hazards. In this article, the results of fifteen unpublished genotoxicity assays conducted with perfluorooctanoate (as either the linear or linear/branched ammonium salt (APFO or the linear/branched sodium salt are reported and include: seven mutation assays (three in vitro reverse mutation assays with histidine auxotrophic strains of Salmonella typhimurium, two in vitro reverse mutation assays with the tryptophan auxotrophic Escherichia coli WP2uvr strain, one in vitro mitotic recombination (gene conversion assay with Saccharomyces cerevisiae D4, and an in vitro Chinese hamster ovary (CHO HGPRT forward mutation assay; seven studies to assess potential for chromosomal damage (three in vitro CHO chromosomal aberration studies, an in vitro human whole blood lymphocyte chromosomal aberration study, and three in vivo mouse micronucleus assays; and an in vitro C3H 10T1/2 cell transformation assay. Although PFOA has not been demonstrated to be metabolized, all in vitro assays were conducted both in the presence and in the absence of a mammalian hepatic microsomal activation system. These assays were originally described in twelve contract laboratory reports which have been available via the United States Environmental Protection Agency public docket (Administrative Record 226 for over a decade; however, the details of these assays have not been published previously in the open scientific literature. With the exception of limited positive findings at high and cytotoxic concentrations in some assay trials which reflected the likely consequence of cytotoxic disruption of normal cellular

  9. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  10. Genotoxicity Expert Panel review: weight of evidence evaluation of the genotoxicity of glyphosate, glyphosate-based formulations, and aminomethylphosphonic acid.

    Science.gov (United States)

    Brusick, David; Aardema, Marilyn; Kier, Larry; Kirkland, David; Williams, Gary

    2016-09-01

    In 2015, the International Agency for Research on Cancer (IARC) published a monograph concluding there was strong evidence for genotoxicity of glyphosate and glyphosate formulations and moderate evidence for genotoxicity of the metabolite aminomethylphosphonic acid (AMPA). These conclusions contradicted earlier extensive reviews supporting the lack of genotoxicity of glyphosate and glyphosate formulations. The IARC Monograph concluded there was strong evidence of induction of oxidative stress by glyphosate, glyphosate formulations, and AMPA. The Expert Panel reviewed the genotoxicity and oxidative stress data considered in the IARC Monograph, together with other available data not considered by IARC. The Expert Panel defined and used a weight of evidence (WoE) approach that included ranking of studies and endpoints by the strength of their linkage to events associated with carcinogenic mechanisms. Importantly, the Expert Panel concluded that there was sufficient information available from a very large number of regulatory genotoxicity studies that should have been considered by IARC. The WoE approach, the inclusion of all relevant regulatory studies, and some differences in interpretation of individual studies led to significantly different conclusions by the Expert Panel compared with the IARC Monograph. The Expert Panel concluded that glyphosate, glyphosate formulations, and AMPA do not pose a genotoxic hazard and the data do not support the IARC Monograph genotoxicity evaluation. With respect to carcinogenicity classification and mechanism, the Expert Panel concluded that evidence relating to an oxidative stress mechanism of carcinogenicity was largely unconvincing and that the data profiles were not consistent with the characteristics of genotoxic carcinogens.

  11. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  12. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  13. Genotoxicity tests on D-tagatose.

    Science.gov (United States)

    Kruger, C L; Whittaker, M H; Frankos, V H

    1999-04-01

    D-tagatose is a low-calorie sweetener that tastes like sucrose. Its genotoxic potential was examined in five standard assays: the Ames Salmonella typhimurium reverse mutation assay, the Escherichia coli/mammalian microsome assay, a chromosomal aberration assay in Chinese hamster ovary cells, a mouse lymphoma forward mutation assay, and an in vivo mouse micronucleus assay. D-tagatose was not found to increase the number of revertants per plate relative to vehicle controls in either the S. typhimurium tester strains or the WP2uvrA- tester strain with or without metabolic activation at doses up to 5000 microg/plate. No significant increase in Chinese hamster ovary cells with chromosomal aberrations was observed at concentrations up to 5000 microg/ml with or without metabolic activation. D-tagatose was not found to increase the mutant frequency in mouse lymphoma L5178Y cells with or without metabolic activation up to concentrations of 5000 microg/ml. D-tagatose caused no significant increase in micronuclei in bone marrow polychromatic erythrocytes at doses up to 5000 mg/kg. D-tagatose was not found to be genotoxic under the conditions of any of the assays described above. Copyright 1999 Academic Press.

  14. Endogenous vs. exogenous regulations in the commons

    DEFF Research Database (Denmark)

    Abatayo, Anna Lou; Lynham, John

    2016-01-01

    It is widely believed that there is strong experimental evidence to support the idea that exogenously imposed regulations crowd out the intrinsic motivations of common pool resource (CPR) users to refrain from over-harvesting. We introduce a novel experimental design that attempts to disentangle...... potential confounds in previous experiments. A key feature of our experimental design is to have the exact same regulations chosen endogenously as those that are imposed exogenously. When we compare the same regulations chosen endogenously to those externally imposed, we observe no differences in extraction...... endogenous regulations with communication and exogenous regulations without communication. Our results suggest that externally imposed regulations do not crowd out intrinsic motivations in the lab and they confirm that communication facilitates cooperation to reduce extraction....

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  17. Characteristics of exogenous carbon monoxide deliveries

    Directory of Open Access Journals (Sweden)

    Hui-jun Hu

    2016-01-01

    Full Text Available Carbon monoxide (CO has long been considered an environmental pollutant and a poison. Exogenous exposure to amounts of CO beyond the physiologic level of the body can result in a protective or adaptive response. However, as a gasotransmitter, endogenous CO is important for multiple physiologic functions. To date, at least seven distinct methods of delivering CO have been utilized in animal and clinical studies. In this mini-review, we summarize the exogenous CO delivery methods and compare their advantages and disadvantages.

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. Effect of exogenous phytohormones and sucrose on ...

    African Journals Online (AJOL)

    The effect of exogenous phytohormones and sucrose on micropropagation and microtuberization from nodal cuttings of Manihot esculenta was studied. Direct and indirect organogeneses were established from these explants. When nodal cuttings were cultured in the presence of 0.01 to 0.1 mg.L-1 of BAP or NAA there was ...

  20. Exogenous fibrolytic enzymes to unlock nutrients: Histological ...

    African Journals Online (AJOL)

    There is a need for a better understanding of the mode-of-action of exogenous fibrolytic enzymes (EFE) used as additives in ruminant feeds. Four forages, treated with EFE, were evaluated in vitro and histologically, in an attempt to determine the effect of EFE on tissue degradation. Weeping love grass, kikuyu leaf material, ...

  1. Metabolic response to exogenous ethanol in yeast

    Indian Academy of Sciences (India)

    In this study, we applied this approach to evaluate the effects of increasing concentration of exogenous ethanol on the Saccharomyces cerevisiae fermentative metabolism. We show that the STOCSY analysis correctly identifies the different types of correlations among the enriched metabolites involved in the fermentation, ...

  2. Open Syllable Once Again. Endogenous or Exogenous?

    Directory of Open Access Journals (Sweden)

    Raffaele Caldarelli

    2013-02-01

    Full Text Available After a brief reply to some critical remarks raised by Mario Enrietti in a paper published in “Studi Slavistici”, VI (2009, the Author tries to explain why Enrietti’s theory of an exogenous, namely Romance origin of the Slavic open syllable structure should be rejected.

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. Genotoxicity in the eyes of bystander cells

    International Nuclear Information System (INIS)

    Hei, Tom K.; Persaud, Rudranath; Zhou, Hongning; Suzuki, Masao

    2004-01-01

    The controversial use of a linear, no threshold extrapolation model for low dose risk assessment has become even more so in light of the recent reports on the bystander phenomenon. The answer to the question as to which of the two phenomena, bystander versus adaptive response, is more important has practical implication in terms of low dose radiation risk assessment. In this review, genotoxicity is used as an endpoint to introduce the two phenomena, provide some insight into the mechanisms of bystander effect and to bridge the two low dose phenomena which operate in opposite directions: the bystander effect tends to exaggerate the effect at low doses, by communicating damage from hit to non-hit cells whereas the adaptive response confers resistance to a subsequent challenging dose by an initial low priming dose

  6. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  7. Genotoxicity Screening of Industrial Effluents using Onion bulbs ...

    African Journals Online (AJOL)

    Michael Horsfall

    ABSTRACT: The potential cytotoxicity and genotoxicity of three industrial wastewaters (brewery .... National recommended water quality criteria – correction; cWorld Health Organisation (1996). ..... Industrial Pollution Policy Management Study.

  8. Determination of heavy metals and genotoxicity of water from an ...

    African Journals Online (AJOL)

    Determination of heavy metals and genotoxicity of water from an artesian well ... do Amaral, Vanessa Marques de Oliveira Moraes, Luciana Pereira Silva ... environmental interest because it is the most important zinc producer district of Brazil.

  9. Genotoxic Effect of Atrazine, Arsenic, Cadmium and Nitrate ...

    African Journals Online (AJOL)

    Atrazine has clastogenic effects and may also act as tumor promoter as it induces the aromatase enzyme. ... bladder cancer. This study ... in MCF-10A cells, suggesting that estrogen receptor modulated the genotoxicity of estrogen. Cd caused ...

  10. In vitro evaluation of mutagenicity and genotoxicity of sitagliptin ...

    African Journals Online (AJOL)

    Keywords: Sitagliptin, Artificial sweeteners, Comet assay, DNA damage, Ames assay, Genotoxicity,. Mutagenicity. Tropical Journal of Pharmaceutical Research is indexed by Science Citation Index (SciSearch), Scopus,. International Pharmaceutical Abstract, Chemical Abstracts, Embase, Index Copernicus, EBSCO, African.

  11. Titanium dioxide nanoparticles cause genotoxicity in human lung epithelial cells

    Science.gov (United States)

    The use of engineered nanoparticles in consumer products is steadily increasing. However, the health effects of exposure to these nanoparticles are not thoroughly understood. This study investigated the genotoxicity of six titanium dioxide and two cerium oxide nanoparticles of va...

  12. THE GENOTOXICITY OF AMBIENT OUTDOOR AIR, A REVIEW: SALMONELLA MUTAGENICITY

    Science.gov (United States)

    The genotoxicity of ambient outdoor air, a review: Salmonella mutagenicityAbstractMutagens in urban air pollution come from anthropogenic sources (especially combustion sources) and are products of airborne chemical reactions. Bacterial mutation tests have been used ...

  13. Low concentration of exogenous carbon monoxide protects mammalian cells against proliferation induced by radiation-induced bystander effect

    International Nuclear Information System (INIS)

    Tong, Liping; Yu, K.N.; Bao, Lingzhi; Wu, Wenqing; Wang, Hongzhi; Han, Wei

    2014-01-01

    Highlights: • We show the possibility of modulate proliferation induced by radiation-induced bystander effect with low concentration carbon monoxide. • Carbon monoxide inhibited proliferation via modulating the transforming growth factor β1 (TGF-β1)/nitric oxide (NO) signaling pathway. • Exogenous carbon monoxide has potential application in clinical radiotherapy. - Abstract: Radiation-induced bystander effect (RIBE) has been proposed to have tight relationship with the irradiation-caused secondary cancers beyond the irradiation-treated area after radiotherapy. Our previous studies demonstrated a protective effect of low concentration carbon monoxide (CO) on the genotoxicity of RIBE after α-particle irradiation. In the present work, a significant inhibitory effect of low-dose exogenous CO, generated by tricarbonyldichlororuthenium (II) dimer [CO-releasing molecule (CORM-2)], on both RIBE-induced proliferation and chromosome aberration was observed. Further studies on the mechanism revealed that the transforming growth factor β1/nitric oxide (NO) signaling pathway, which mediated RIBE signaling transduction, could be modulated by CO involved in the protective effects. Considering the potential of exogenous CO in clinical applications and its protective effect on RIBE, the present work aims to provide a foundation for potential application of CO in radiotherapy

  14. Low concentration of exogenous carbon monoxide protects mammalian cells against proliferation induced by radiation-induced bystander effect

    Energy Technology Data Exchange (ETDEWEB)

    Tong, Liping [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Yu, K.N. [Department of Physics and Materials Science, City University of Hong Kong, Tat Chee Avenue, Kowloon Tong (Hong Kong); Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Bao, Lingzhi; Wu, Wenqing; Wang, Hongzhi [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Han, Wei, E-mail: hanw@hfcas.cn [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China)

    2014-01-15

    Highlights: • We show the possibility of modulate proliferation induced by radiation-induced bystander effect with low concentration carbon monoxide. • Carbon monoxide inhibited proliferation via modulating the transforming growth factor β1 (TGF-β1)/nitric oxide (NO) signaling pathway. • Exogenous carbon monoxide has potential application in clinical radiotherapy. - Abstract: Radiation-induced bystander effect (RIBE) has been proposed to have tight relationship with the irradiation-caused secondary cancers beyond the irradiation-treated area after radiotherapy. Our previous studies demonstrated a protective effect of low concentration carbon monoxide (CO) on the genotoxicity of RIBE after α-particle irradiation. In the present work, a significant inhibitory effect of low-dose exogenous CO, generated by tricarbonyldichlororuthenium (II) dimer [CO-releasing molecule (CORM-2)], on both RIBE-induced proliferation and chromosome aberration was observed. Further studies on the mechanism revealed that the transforming growth factor β1/nitric oxide (NO) signaling pathway, which mediated RIBE signaling transduction, could be modulated by CO involved in the protective effects. Considering the potential of exogenous CO in clinical applications and its protective effect on RIBE, the present work aims to provide a foundation for potential application of CO in radiotherapy.

  15. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  16. Genotoxic consequences of endogenous aldehydes on mouse haematopoietic stem cell function.

    Science.gov (United States)

    Garaycoechea, Juan I; Crossan, Gerry P; Langevin, Frederic; Daly, Maria; Arends, Mark J; Patel, Ketan J

    2012-09-27

    Haematopoietic stem cells (HSCs) regenerate blood cells throughout the lifespan of an organism. With age, the functional quality of HSCs declines, partly owing to the accumulation of damaged DNA. However, the factors that damage DNA and the protective mechanisms that operate in these cells are poorly understood. We have recently shown that the Fanconi anaemia DNA-repair pathway counteracts the genotoxic effects of reactive aldehydes. Mice with combined inactivation of aldehyde catabolism (through Aldh2 knockout) and the Fanconi anaemia DNA-repair pathway (Fancd2 knockout) display developmental defects, a predisposition to leukaemia, and are susceptible to the toxic effects of ethanol-an exogenous source of acetaldehyde. Here we report that aged Aldh2(-/-) Fancd2(-/-) mutant mice that do not develop leukaemia spontaneously develop aplastic anaemia, with the concomitant accumulation of damaged DNA within the haematopoietic stem and progenitor cell (HSPC) pool. Unexpectedly, we find that only HSPCs, and not more mature blood precursors, require Aldh2 for protection against acetaldehyde toxicity. Additionally, the aldehyde-oxidizing activity of HSPCs, as measured by Aldefluor stain, is due to Aldh2 and correlates with this protection. Finally, there is more than a 600-fold reduction in the HSC pool of mice deficient in both Fanconi anaemia pathway-mediated DNA repair and acetaldehyde detoxification. Therefore, the emergence of bone marrow failure in Fanconi anaemia is probably due to aldehyde-mediated genotoxicity restricted to the HSPC pool. These findings identify a new link between endogenous reactive metabolites and DNA damage in HSCs, and define the protective mechanisms that counteract this threat.

  17. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  20. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  1. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  3. Genotoxicity evaluation of alpha-linolenic acid-diacylglycerol oil

    Directory of Open Access Journals (Sweden)

    Hiroshi Honda

    Full Text Available The alpha-linolenic acid (ALA-diacylglycerol (DAG oil is an edible oil enriched with DAG (>80% and ALA (>50%. Although DAG oil, which mainly consists of oleic and linoleic acids has no genotoxic concerns, the fatty acid composition could affect the chemical property of DAG. Therefore, the purpose of this study was to evaluate the genotoxicity of ALA-DAG oil using standard genotoxicity tests in accordance with the OECD guidelines. ALA-DAG oil showed negative results in the bacterial reverse mutation test (Ames test and in vitro micronucleus test in cultured Chinese hamster lung cells with and without metabolic activation, and in the in vivo bone marrow micronucleus test in mice. Our results did not show any genotoxicity, suggesting that the fatty acid composition had no deleterious effects. We conclude that ALA-DAG oil had no genotoxicity concerns under the testing conditions. Keywords: Alpha-linolenic acid-rich diacylglycerol, Diacylglycerol, Alpha-linolenic acid, Fatty acid composition, Genotoxicity

  4. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  5. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  6. Exogenous and endogenous landforms in the Mediterranean

    Science.gov (United States)

    Acar, Julia

    2017-04-01

    11th graders have already learned about endogenous forces and now we are having a closer look at the exogenous forces which act on the Earth's surface. The Po River-system, for example, is responsible for the formation of the alpine region. Students are asked to find out how this works with the help of the rock-cycle scheme, several suitable maps and information on weathering and the texture of rocks, erosion, etc. We will form groups that will look at different types of rock formations (including an example in the Mediterranean region each). Depending on the number of lessons available we will add the exogenous effect of flowing water and ice (glacial over forming) to the topic. At the end every group will present their findings explaining the scientific context by using topographic examples.

  7. Exogenous shocks and governing energy security

    OpenAIRE

    Diriöz, Ali Oğuz

    2017-01-01

    Cataloged from PDF version of article. Thesis (Ph.D.): Bilkent University, Department of International Relations, İhsan Doğramacı Bilkent University, 2017. Includes bibliographical references (leaves 219-248). The research examines how governments maintain energy security when faced with exogenous shocks. The main focus of inquiry examines the relative influence of markets vs. geopolitics in the area of energy security using the comparative case studies of Turkey, France, and Netherl...

  8. Exogenous sample contamination. Sources and interference.

    Science.gov (United States)

    Cornes, Michael P

    2016-12-01

    Clinical laboratory medicine is involved in the vast majority of patient care pathways. It has been estimated that pathology results inform 60-70% of critical patient care decisions. The primary goal of the laboratory is to produce precise and accurate results which reflect the true situation in vivo. It is not surprising that interference occurs in laboratory analysis given the complexity of some of the assays used to perform them. Interference is defined as "the effect of a substance upon any step in the determination of the concentration or catalytic activity of the metabolite". Exogenous interferences are defined as those that derive from outside of the body and are therefore not normally found in a specimen and can cause either a positive or negative bias in analytical results. Interferences in analysis can come from various sources and can be classified as endogenous or exogenous. Exogenous substances could be introduced at any point in the sample journey. The laboratory must take responsibility for the quality of results produced. It has a responsibility to have processes in place to identify and minimise the occurrence and effect contamination and interference. To do this well the laboratory needs to work with clinicians and manufacturers. Failure to identify an erroneous result could have an impact on patient care, patient safety and also on hospital budgets. However it is not always easy to recognise interferences. This review summarises the types and sources of exogenous interference and some steps to minimise the impact they have. Crown Copyright © 2016. Published by Elsevier Inc. All rights reserved.

  9. Pyruvate remediation of cell stress and genotoxicity induced by haloacetic acid drinking water disinfection by-products.

    Science.gov (United States)

    Dad, Azra; Jeong, Clara H; Pals, Justin A; Wagner, Elizabeth D; Plewa, Michael J

    2013-10-01

    Monohaloacetic acids (monoHAAs) are a major class of drinking water disinfection by-products (DBPs) and are cytotoxic, genotoxic, mutagenic, and teratogenic. We propose a model of toxic action based on monoHAA-mediated inhibition of glyceraldehyde-3-phosphate dehydrogenase (GAPDH) as a target cytosolic enzyme. This model predicts that GAPDH inhibition by the monoHAAs will lead to a severe reduction of cellular ATP levels and repress the generation of pyruvate. A loss of pyruvate will lead to mitochondrial stress and genomic DNA damage. We found a concentration-dependent reduction of ATP in Chinese hamster ovary cells after monoHAA treatment. ATP reduction per pmol monoHAA followed the pattern of iodoacetic acid (IAA) > bromoacetic acid (BAA) > chloroacetic acid (CAA), which is the pattern of potency observed with many toxicological endpoints. Exogenous supplementation with pyruvate enhanced ATP levels and attenuated monoHAA-induced genomic DNA damage as measured with single cell gel electrophoresis. These data were highly correlated with the SN 2 alkylating potentials of the monoHAAs and with the induction of toxicity. The results from this study strongly support the hypothesis that GAPDH inhibition and the possible subsequent generation of reactive oxygen species is linked with the cytotoxicity, genotoxicity, teratogenicity, and neurotoxicity of these DBPs. Copyright © 2013 Wiley Periodicals, Inc.

  10. The cellular receptors of exogenous RNA

    Directory of Open Access Journals (Sweden)

    Patryk Reniewicz

    2016-04-01

    Full Text Available One of the key determinants of survival for organisms is proper recognition of exogenous and endogenous nucleic acids. Therefore, high eukaryotes developed a number of receptors that allow for discrimination between friend or foe DNA and RNA. Appearance of exogenous RNA in cytoplasm provides a signal of danger and triggers cellular responses that facilitate eradication of a pathogen. Recognition of exogenous RNA is additionally complicated by fact that large amount of endogenous RNA is present in cytoplasm Thus, number of different receptors, found in eukaryotic cells, is able to recognize that nucleic acid. First group of those receptors consist endosomal Toll like receptors, namely TLR3, TLR7, TLR8 and TLR13. Those receptors recognize RNA released from pathogens that enter the cell by endocytosis. The second group includes cytoplasmic sensors like PKR and the family of RLRs comprised of RIG-I, MDA5 and LGP2. Cytoplasmic receptors recognize RNA from pathogens invading the cell by non-endocytic pathway. In both cases binding of RNA by its receptors results in activation of the signalling cascades that lead to the production of interferon and other cytokines.

  11. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  13. Genotoxic damage in auto body shop workers.

    Science.gov (United States)

    Siebel, Anna Maria; Basso da Silva, Luciano

    2010-10-01

    Some studies have shown increased DNA damage among car painters, but other professionals working in auto body and paint shops have not been extensively assessed. The aim of this study was to assess DNA damage in different types of auto body shop workers by measuring micronucleus (MN) levels in exfoliated buccal cells. The mean number of cells with MN per 2000 exfoliated buccal cells was analyzed in three groups of male workers: auto body repair technicians, painters, and office workers (control group). All participants answered a questionnaire inquiring about age, smoking habits, alcohol consumption, work practices, occupational exposure time, job activities, and use of protective equipment. The mean number of cells with MN was 3.50 ± 1.50 in auto body painters, 3.91 ± 2.10 in auto body repair technicians, and 0.80 ± 0.78 in office workers, with a significant difference between the control group and the two other groups (p = 0.0001). Age, occupational exposure time, use of protective masks, alcohol consumption, and smoking habit did not affect MN results. The findings indicate that technicians and painters working in auto body shops are at risk for genotoxic damage, while office workers seem to be protected.

  14. DNA dosimetry assessment for sunscreen genotoxic photoprotection.

    Directory of Open Access Journals (Sweden)

    André Passaglia Schuch

    Full Text Available Due to the increase of solar ultraviolet radiation (UV incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter.The Sun Protection Factor for DNA (DNA-SPF is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF. Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations.The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage.

  15. DNA dosimetry assessment for sunscreen genotoxic photoprotection.

    Science.gov (United States)

    Schuch, André Passaglia; Lago, Juliana Carvalhães; Yagura, Teiti; Menck, Carlos Frederico Martins

    2012-01-01

    Due to the increase of solar ultraviolet radiation (UV) incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter. The Sun Protection Factor for DNA (DNA-SPF) is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD) and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF). Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations. The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage.

  16. DNA Dosimetry Assessment for Sunscreen Genotoxic Photoprotection

    Science.gov (United States)

    Schuch, André Passaglia; Lago, Juliana Carvalhães; Yagura, Teiti; Menck, Carlos Frederico Martins

    2012-01-01

    Background Due to the increase of solar ultraviolet radiation (UV) incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter. Methodology/Principal Findings The Sun Protection Factor for DNA (DNA-SPF) is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD) and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF). Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations. Conclusions/Significance The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage. PMID:22768281

  17. Genotoxic effects of zinc oxide nanoparticles

    Science.gov (United States)

    Heim, Julia; Felder, Eva; Tahir, Muhammad Nawaz; Kaltbeitzel, Anke; Heinrich, Ulf Ruediger; Brochhausen, Christoph; Mailänder, Volker; Tremel, Wolfgang; Brieger, Juergen

    2015-05-01

    The potential toxicity of nanoparticles has currently provoked public and scientific discussions, and attempts to develop generally accepted handling procedures for nanoparticles are under way. The investigation of the impact of nanoparticles on human health is overdue and reliable test systems accounting for the special properties of nanomaterials must be developed. Nanoparticular zinc oxide (ZnO) may be internalised through ambient air or the topical application of cosmetics, only to name a few, with unpredictable health effects. Therefore, we analysed the determinants of ZnO nanoparticle (NP) genotoxicity. ZnO NPs (15-18 nm in diameter) were investigated at concentrations of 0.1, 10 and 100 μg mL-1 using the cell line A549. Internalised NPs were only infrequently detectable by TEM, but strongly increased Zn2+ levels in the cytoplasm and even more in the nuclear fraction, as measured by atom absorption spectroscopy, indicative of an internalised zinc and nuclear accumulation. We observed a time and dosage dependent reduction of cellular viability after ZnO NP exposure. ZnCl2 exposure to cells induced similar impairments of cellular viability. Complexation of Zn2+ with diethylene triamine pentaacetic acid (DTPA) resulted in the loss of toxicity of NPs, indicating the relevant role of Zn2+ for ZnO NP toxicity. Foci analyses showed the induction of DNA double strand breaks (DSBs) by ZnO NPs and increased intracellular reactive oxygen species (ROS) levels. Treatment of the cells with the ROS scavenger N-acetyl-l-cysteine (NAC) resulted in strongly decreased intracellular ROS levels and reduced DNA damage. However, a slow increase of ROS after ZnO NP exposure and reduced but not quashed DSBs after NAC-treatment suggest that Zn2+ may exert genotoxic activities without the necessity of preceding ROS-induction. Our data indicate that ZnO NP toxicity is a result of cellular Zn2+ intake. Subsequently increased ROS-levels cause DNA damage. However, we found evidence for

  18. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  19. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  20. Evaluation of Cytotoxicity and Genotoxicity of Acacia aroma Leaf Extracts

    Directory of Open Access Journals (Sweden)

    C. M. Mattana

    2014-01-01

    Full Text Available Acacia aroma, native plant from San Luis, Argentina, is commonly used as antiseptic and for healing of wounds. The present study was conducted to investigate the in vitro cytotoxicity and genotoxicity of hot aqueous extract (HAE and ethanolic extract (EE of A. aroma. The cytotoxic activity was assayed by neutral red uptake assay on Vero cell. Cell treatment with a range from 100 to 5000 μg/mL of HAE and EE showed that 500 μg/mL and 100 μg/mL were the maximum noncytotoxic concentrations, respectively. The CC50 was 658 μg/mL for EE and 1020 μg/mL for HAE. The genotoxicity was tested by the single-cell gel electrophoresis comet assay. The results obtained in the evaluation of DNA cellular damage exposed to varied concentrations of the HAE showed no significant genotoxic effect at range of 1–20 mg/mL. The EE at 20 mg/mL showed moderate genotoxic effect related to the increase of the DNA percentage contained in tail of the comet; DNA was classified in category 2. At concentrations below 5 mg/mL, the results of cytotoxicity and genotoxicity of aqueous and ethanolic extracts of Acacia aroma guarantee the safety at cell and genomic level. However further studies are needed for longer periods including animal models to confirm the findings.

  1. Ocularity Feature Contrast Attracts Attention Exogenously

    Directory of Open Access Journals (Sweden)

    Li Zhaoping

    2018-02-01

    Full Text Available An eye-of-origin singleton, e.g., a bar shown to the left eye among many other bars shown to the right eye, can capture attention and gaze exogenously or reflexively, even when it appears identical to other visual input items in the scene and when the eye-of-origin feature is irrelevant to the observer’s task. Defining saliency as the strength of exogenous attraction to attention, we say that this eye-of-origin singleton, or its visual location, is salient. Defining the ocularity of a visual input item as the relative difference between its left-eye input and its right-eye input, this paper shows the general case that an ocularity singleton is also salient. For example, a binocular input item among monocular input items is salient, so is a left-eye-dominant input item (e.g., a bar with a higher input contrast to the left eye than to the right eye among right-eye-dominant items. Saliency by unique input ocularity is analogous to saliency by unique input colour (e.g., a red item among green ones, as colour is determined by the relative difference(s between visual inputs to different photoreceptor cones. Just as a smaller colour difference between a colour singleton and background items makes this singleton less salient, so does a smaller ocularity difference between an ocularity singleton and background items. While a salient colour difference is highly visible, a salient ocularity difference is often perceptually invisible in some cases and discouraging gaze shifts towards it in other cases, making its behavioural manifestation not as apparent. Saliency by ocularity contrast provides another support to the idea that the primary visual cortex creates a bottom-up saliency map to guide attention exogenously.

  2. Genotoxicity of Superparamagnetic Iron Oxide Nanoparticles in Granulosa Cells

    Directory of Open Access Journals (Sweden)

    Marina Pöttler

    2015-11-01

    Full Text Available Nanoparticles that are aimed at targeting cancer cells, but sparing healthy tissue provide an attractive platform of implementation for hyperthermia or as carriers of chemotherapeutics. According to the literature, diverse effects of nanoparticles relating to mammalian reproductive tissue are described. To address the impact of nanoparticles on cyto- and genotoxicity concerning the reproductive system, we examined the effect of superparamagnetic iron oxide nanoparticles (SPIONs on granulosa cells, which are very important for ovarian function and female fertility. Human granulosa cells (HLG-5 were treated with SPIONs, either coated with lauric acid (SEONLA only, or additionally with a protein corona of bovine serum albumin (BSA; SEONLA-BSA, or with dextran (SEONDEX. Both micronuclei testing and the detection of γH2A.X revealed no genotoxic effects of SEONLA-BSA, SEONDEX or SEONLA. Thus, it was demonstrated that different coatings of SPIONs improve biocompatibility, especially in terms of genotoxicity towards cells of the reproductive system.

  3. Plant genotoxicity: a molecular cytogenetic approach in plant bioassays.

    Science.gov (United States)

    Maluszynska, Jolanta; Juchimiuk, Jolanta

    2005-06-01

    It is important for the prevention of DNA changes caused by environment to understand the biological consequences of DNA damages and their molecular modes of action that lead to repair or alterations of the genetic material. Numerous genotoxicity assay systems have been developed to identify DNA reactive compounds. The available data show that plant bioassays are important tests in the detection of genotoxic contamination in the environment and the establishment of controlling systems. Plant system can detect a wide range of genetic damage, including gene mutations and chromosome aberrations. Recently introduced molecular cytogenetic methods allow analysis of genotoxicity, both at the chromosomal and DNA level. FISH gives a new possibility of the detection and analysis of chromosomal rearrangements in a great detail. DNA fragmentation can be estimated using the TUNEL test and the single cell gel electrophoresis (Comet assay).

  4. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  5. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  6. Mequindox Induced Genotoxicity and Carcinogenicity in Mice

    Directory of Open Access Journals (Sweden)

    Qianying Liu

    2018-04-01

    Full Text Available Mequindox (MEQ, acting as an inhibitor of deoxyribonucleic acid (DNA synthesis, is a synthetic heterocyclic N-oxides. To investigate the potential carcinogenicity of MEQ, four groups of Kun-Ming (KM mice (50 mice/sex/group were fed with diets containing MEQ (0, 25, 55, and 110 mg/kg for one and a half years. The result showed adverse effects on body weights, feed consumption, hematology, serum chemistry, organ weights, relative organ weights, and incidence of tumors during most of the study period. Treatment-related changes in hematology, serum chemistry, relative weights and histopathological examinations revealed that the hematological system, liver, kidneys, and adrenal glands, as well as the developmental and reproductive system, were the main targets after MEQ administration. Additionally, MEQ significantly increased the frequency of micronucleated normochromatic erythrocytes in bone marrow cells of mice. Furthermore, MEQ increased the incidence of tumors, including mammary fibroadenoma, breast cancer, corticosuprarenaloma, haemangiomas, hepatocarcinoma, and pulmonary adenoma. Interestingly, the higher incidence of tumors was noted in M25 mg/kg group, the lowest dietary concentration tested, which was equivalent to approximately 2.25 and 1.72 mg/kg b.w./day in females and males, respectively. It was assumed that the lower toxicity might be a reason for its higher tumor incidence in M25 mg/kg group. This finding suggests a potential relationships among the dose, general toxicity and carcinogenicity in vivo, and further study is required to reveal this relationship. In conclusion, the present study demonstrates that MEQ is a genotoxic carcinogen in KM mice.

  7. Hepatotoxicity and genotoxicity of gasoline fumes in albino rats

    Directory of Open Access Journals (Sweden)

    Folarin O. Owagboriaye

    2017-09-01

    Full Text Available Toxic effects of gasoline fumes have been reported, but evidence of its hepatotoxicity and genotoxicity are rare. Therefore, this study assesses hepatotoxicity and genotoxicity of gasoline fumes on forty Albino rats randomly assigned to five experimental treatments (T with eight rats per treatment (T1, T2, T3, T4 and T5. T1(Control was housed in a section of experimental animal house free from gasoline fumes while T2, T3, T4 and T5 were exposed to gasoline fumes in exposure chambers for one, three, five and nine hours daily respectively for twelve weeks. Serum alanine aminotransferase (ALT, aspartate aminotransferase (AST, alkaline phosphatase (ALP and histopathological examination of the liver tissues were used as diagnostic markers to assess liver dysfunction. Genotoxicity test was conducted on the lung tissues using randomly amplified polymorphic DNA fingerprinting polymerase chain reaction (RAPD PCR technique. Significant increase (p < 0.05 in the level of ALT, AST and ALP for T2, T3, T4 and T5 compared to T1 were recorded. Photomicrograph examination of the liver sections of T1 showed hepatic tissue with normal liver cell architecture while that of T2, T3, T4 and T5 revealed degenerative changes in the ultrastructural integrity of the hepatic cells. Genotoxicity test revealed DNA bands at a reducing intensity from T1 to T5. Dendrogram showed DNA damage in the lungs of T3, T4 and T5 were closely similar and the genotoxic impact was more in T3. Frequent exposure to gasoline fumes was observed to induce hepatoxicity and genotoxicity, hence impairing the normal liver function and gene structure.

  8. In vitro genotoxicity assessment of MTES, GPTES and TEOS, three precursors intended for use in food contact coatings.

    Science.gov (United States)

    Lionti, Krystelle; Séverin, Isabelle; Dahbi, Laurence; Toury, Bérangère; Chagnon, Marie-Christine

    2014-03-01

    Organoalkoxysilanes are precursors that are used increasingly in the synthesis of food contact coatings. To comply with the EU regulation, their potential toxicity must be assessed, and very little information is known. The genotoxicity of three common precursors was studied, namely, tetraethylorthosilicate (TEOS), methyltriethoxysilane (MTES) and 3-glycidyloxypropyltriethoxysilane (GPTES). By the Ames test, MTES and TEOS were not mutagenic for bacteria. A significant positive response was observed with GPTES in the TA100 and TA1535 strains. The mutagenic effect was more pronounced in the presence of the exogenous metabolic activation system with an increase of the induction factor (ten-fold higher for the TA1535 strain). In the micronucleus assay performed with a human hepatoma cell line (HepG2 cells), GPTES gave negative results even in the presence of an exogenous activation system. To ascertain the possibility of using this precursor in food contact material, its migration must be monitored according to the coating formulation because migration might result in hazardous human exposure. Copyright © 2014. Published by Elsevier Ltd.

  9. Correlation between the genotoxicity endpoints measured by two different genotoxicity assays: comet assay and CBMN assay

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-06-01

    The results concerning of positive findings by micronuclei and non significant ones by comet assay, are corroborated by Deng et al. (2005 study performed in workers occupationally exposed to methotrexate, also a cytostatic drug. According to Cavallo et al. (2009, the comet assay seems to be more suitable for the prompt evaluation of the genotoxic effects, for instance, of polycyclic aromatic hydrocarbons mixtures containing volatile substances, whereas the micronucleus test seems more appropriate to evaluate the effects of exposure to antineoplastic agents. However, there are studies that observed an increase in both the comet assay and the micronucleus test in nurses handling antineoplastic drugs, although statistical significance was only seen in the comet assay, quite the opposite of our results (Maluf & Erdtmann, 2000; Laffon et al. 2005.

  10. Interplay between endogenous and exogenous fluctuations in financial markets

    OpenAIRE

    Gontis, Vygintas

    2016-01-01

    We address microscopic, agent based, and macroscopic, stochastic, modeling of the financial markets combining it with the exogenous noise. The interplay between the endogenous dynamics of agents and the exogenous noise is the primary mechanism responsible for the observed long-range dependence and statistical properties of high volatility return intervals. By exogenous noise we mean information flow or/and order flow fluctuations. Numerical results based on the proposed model reveal that the ...

  11. International Environmental Agreements with Endogenous or Exogenous Risk

    OpenAIRE

    Fuhai Hong; Larry Karp

    2014-01-01

    We examine the effect of endogenous and exogenous risk on the equilibrium (expected) membership of an International Environmental Agreement when countries are risk averse. Endogenous risk arises when countries use mixed rather than pure strategies at the participation game, and exogenous risk arises from the inherent uncertainty about the costs and benefits of increased abate- ment. Under endogenous risk, an increase in risk aversion increases expected participation. Under exogenous risk and ...

  12. Independent effects of endogenous and exogenous attention in touch.

    Science.gov (United States)

    Jones, Alexander; Forster, Bettina

    2013-12-01

    Endogenous and exogenous attention in touch have typically been investigated separately. Here we use a double-cueing paradigm manipulating both types of orienting in each trial. Bilateral endogenous cues induced long-lasting facilitation of endogenous attention up to 2 s. However, the exogenous cue only elicited an effect at short intervals. Our results favour a supramodal account of attention and this study provides new insight into how endogenous and exogenous attention operates in the tactile modality.

  13. SIGNALING TO THE P53 TUMOR SUPPRESSOR THROUGH PATHWAYS ACTIVATED BY GENOTOXIC AND NON-GENOTOXIC STRESSES.

    Energy Technology Data Exchange (ETDEWEB)

    ANDERSON,C.W.APPELLA,E.

    2002-07-01

    The p53 tumor suppressor is a tetrameric transcription factor that is post-translational modified at {approx}18 different sites by phosphorylation, acetylation, or sumoylation in response to various cellular stress conditions. Specific posttranslational modifications, or groups of modifications, that result from the activation of different stress-induced signaling pathways are thought to modulate p53 activity to regulate cell fate by inducing cell cycle arrest, apoptosis, or cellular senescence. Here we review the posttranslational modifications to p53 and the pathways that produce them in response to both genotoxic and non-genotoxic stresses.

  14. Catabolism of exogenously supplied thymidine to thymine and dihydrothymine by platelets in human peripheral blood

    International Nuclear Information System (INIS)

    Pero, R.W.; Johnson, D.; Olsson, A.

    1984-01-01

    The interference of platelets with the estimation of unscheduled DNA synthesis in human peripheral mononuclear leukocytes following genotoxic exposure was studied. A 96% reduction in the unscheduled DNA synthesis value was achieved by incubating [ 3 H]thymidine with platelet-rich plasma for 5 hr at 37 degrees. Using radioactive thymine-containing compounds, together with quantitative analyses based on thin-layer and ion-exchange chromatographies, we have shown that thymidine was converted to thymine which, in turn, was converted to dihydrothymine in platelet-rich plasma. The enzymes responsible were separated from platelet lysates by gel filtration and were identified as thymidine phosphorylase and dihydrothymine dehydrogenase. The phosphorylase reversibly catalyzed the formation of thymine from thymidine and converted bromodeoxyuridine to bromouracil. The dehydrogenase reversibly catalyzed the interconversion of thymine and dihydrothymine in a reaction dependent on NADP(H), and it was inhibited by diazouracil and by thymine. Nearly all the thymidine-catabolizing activity found in whole blood samples supplied exogenously with thymidine was accounted for by the platelets. Since most genetic toxicological tests that use blood samples do not involve removing platelets from the blood cell cultures, then it is concluded that precautions should be taken in the future to determine the influence of platelets on these test systems. This is particularly true for methods dependent on thymidine pulses such as unscheduled DNA synthesis, or those dependent on bromodeoxyuridine, such as sister chromatid exchanges, since this nucleoside is also a substrate for thymidine phosphorylase

  15. Exogenous Salicylic Acid Enhances the Resistance of Wheat Seedlings to Hessian Fly (Diptera: Cecidomyiidae) Infestation Under Heat Stress.

    Science.gov (United States)

    Underwood, Joshua; Moch, John; Chen, Ming-Shun; Zhu, Lieceng

    2014-10-01

    Heat stress exerts significant impact on plant-parasite interactions. Phytohormones, such as salicylic acid (SA), play important roles in plant defense against parasite attacks. Here, we studied the impact of a combination of heat stress and exogenous SA on the resistance of wheat (Triticum aestivum L.) plants to the Hessian fly [Mayetiola destructor (Say)]. We found that the wheat cultivar 'Molly', which contains the resistance gene H13, lost resistance to Hessian fly under heat stress (40°C for 3 and 6 h), and that exogenous application of SA on Molly seedlings right before heat stress can partially prevent the loss of resistance of Molly plants under heat conditions. Our findings have significant implications for understanding the dynamics of plant-insect interactions in the context of heat stress. © 2014 Entomological Society of America.

  16. Cytotoxicity and genotoxicity of lipid nanocapsules.

    Science.gov (United States)

    Le Roux, Gaël; Moche, Hélène; Nieto, Alejandro; Benoit, Jean-Pierre; Nesslany, Fabrice; Lagarce, Frédéric

    2017-06-01

    Lipid nanocapsules (LNCs) offer a promising method for the entrapment and nanovectorisation of lipophilic molecules. This new type of nanocarrier, formulated according to a solvent-free process and using only regulatory-approved components, exhibits many prerequisites for being well tolerated. Although toxicological reference values have already been obtained in mice, interaction of LNCs at the cell level needs to be elucidated. LNCs, measuring from 27.0±0.1nm (25nm LNCs) and 112.1±1.8nm (100nm LNCs) and with a zeta potential between -38.7±1.2mV and +9.18±0.4mV, were obtained by a phase inversion process followed by post-insertion of carboxy- or amino-DSPE-PEG. Trypan blue, MTS and neutral red uptake (NRU) assays were performed to evaluate the cytotoxicity of LNCs on mouse macrophage-like cells RAW264.7 after 24h of exposure. The determination of 50% lethal concentration (LC50) showed a size effect of LNCs on toxicity profiles: LC50 ranged from 1.036mg/L (MTS) and 0.477mg/mL (NRU) for 25nm LNCs, to 4.42mg/mL (MTS) and 2.18mg/mL (NRU) for 100nm LNCs. Surfactant Solutol® HS15 has been shown to be the only constituent to exhibit cytotoxicity; its LC50 reached 0.427mg/mL. Moreover, LNCs were not more toxic than their components in simple mixtures. At sublethal concentration, 100nm LNCs only were able to induce a significant production of nitric oxide (NO) by RAW264.7 cells, as assessed by the Griess reaction. Again, surfactant was the only component responsible for an increased NO release (1.8±0.2-fold). Genotoxicity assays revealed no DNA damage on human lymphocytes in both the in vitro Comet and micronucleus assays using 4-hour and 24-hour treatments, respectively. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  18. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  19. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  20. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Exogenously triggered response inhibition in developmental stuttering.

    Science.gov (United States)

    Eggers, Kurt; De Nil, Luc F; Van den Bergh, Bea R H

    2018-06-01

    The purpose of the present study was to examine relations between children's exogenously triggered response inhibition and stuttering. Participants were 18 children who stutter (CWS; mean age = 9;01 years) and 18 children who not stutter (CWNS; mean age = 9;01 years). Participants were matched on age (±3 months) and gender. Response inhibition was assessed by a stop signal task (Verbruggen, Logan, & Stevens, 2008). Results suggest that CWS, compared to CWNS, perform comparable to CWNS in a task where response control is externally triggered. Our findings seem to indicate that previous questionnaire-based findings (Eggers, De Nil, & Van den Bergh, 2010) of a decreased efficiency of response inhibition cannot be generalized to all types of response inhibition. Copyright © 2018 Elsevier Inc. All rights reserved.

  3. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  4. Genotoxic Maillard byproducts in current phytopharmaceutical preparations of Echinodorus grandiflorus

    Directory of Open Access Journals (Sweden)

    ELISANGELA C. LIMA-DELLAMORA

    2014-09-01

    Full Text Available Extracts of Echinodorus grandiflorus obtained from dried leaves by three different techniques were evaluated by bacterial lysogenic induction assay (Inductest in relation to their genotoxic properties. Before being added to test cultures, extracts were sterilized either by steam sterilization or ultraviolet light. Only the extracts prepared by infusion and steam sterilized have shown genotoxic activity. The phytochemical analysis revealed the presence of the flavonoids isovitexin, isoorientin, swertisin and swertiajaponin, isolated from a genotoxic fraction. They were assayed separately and tested negative in the Inductest protocol. The development of browning color and sweet smell in extracts submitted to heat, prompted further chemical analysis in search for Maillard's reaction precursors. Several aminoacids and reducing sugars were cast in the extract. The presence of characteristic Maillard's melanoidins products was determined by spectrophotometry in the visible region and the inhibition of this reaction was observed when its characteristic inhibitor, sodium bisulfite, was added prior to heating. Remarkably, this is the first paper reporting on the appearance of such compounds in a phytomedicine preparation under a current phytopharmaceutical procedure. The genotoxic activity of such heat-prepared infusions imply in some risk of developing degenerative diseases for patients in long-term, uncontrolled use of such phytomedicines.

  5. Genotoxicity of Swimming Pool Water and Carcinogenicity of Drinking Water

    Science.gov (United States)

    Among the 11 disinfection by-products (DBPs) in drinking water that are regulated by the U.S. EPA, (a) 2 DBPs (chloroaceticacid and chlorite) are not carcinogenic-in either of2 species; (b) chlorite is not carcinogenic in 3 rodent assays and has never been tested for genotoxicity...

  6. Genotoxicity of Swimming Pool Water and Carcinogenicity of Drinking Water**

    Science.gov (United States)

    Among the 11 disinfection by-products (DBPs) in drinking water that are regulated by the U.S. EPA, (a) 2 DBPs (chloroaceticacid and chlorite) are not carcinogenic-in either of2 species; (b) chlorite is not carcinogenic in 3 rodent assays and has never been tested for genotoxicity...

  7. Mutagenicity and genotoxicity of coal fly ash water leachate.

    Science.gov (United States)

    Chakraborty, Rajarshi; Mukherjee, Anita

    2009-03-01

    Fly ash is a by-product of coal-fired electricity generation plants. The prevalent practice of disposal is as slurry of ash and water to storage or ash ponds located near power stations. This has lain to waste thousands of hectares of land all over the world. Since leaching is often the cause of off-site contamination and pathway of introduction into the human environment, a study on the genotoxic effects of fly ash leachate is essential. Leachate prepared from the fly ash sample was analyzed for metal content, and tested for mutagenicity and genotoxicity. Analyses of metals show predominance of the metals-sodium, silicon, potassium, calcium, magnesium, iron, manganese, zinc, and sulphate. The Ames Salmonella mutagenicity assay, a short-term bacterial reverse mutation assay, was conducted on two-tester strains of Salmonella typhimurium strains TA97a and TA102. For genotoxicity, the alkaline version of comet assay on fly ash leachate was carried in vitro on human blood cells and in vivo on Nicotiana plants. The leachate was directly mutagenic and induced significant (Ppercentage (%), tail length (mum), and olive tail moment (arbitrary units). Our results indicate that leachate from fly ash dumpsites has the genotoxic potential and may lead to adverse effects on vegetation and on the health of exposed human populations.

  8. Genistein genotoxicity: Critical considerations of in vitro exposure dose

    International Nuclear Information System (INIS)

    Klein, Catherine B.; King, Audrey A.

    2007-01-01

    The potential health benefits of soy-derived phytoestrogens include their reported utility as anticarcinogens, cardioprotectants and as hormone replacement alternatives in menopause. Although there is increasing popularity of dietary phytoestrogen supplementation and of vegetarian and vegan diets among adolescents and adults, concerns about potential detrimental or other genotoxic effects persist. While a variety of genotoxic effects of phytoestrogens have been reported in vitro, the concentrations at which such effects occurred were often much higher than the physiologically relevant doses achievable by dietary or pharmacologic intake of soy foods or supplements. This review focuses on in vitro studies of the most abundant soy phytoestrogen, genistein, critically examining dose as a crucial determinant of cellular effects. In consideration of levels of dietary genistein uptake and bioavailability we have defined in vitro concentrations of genistein > 5 μM as non-physiological, and thus 'high' doses, in contrast to much of the previous literature. In doing so, many of the often-cited genotoxic effects of genistein, including apoptosis, cell growth inhibition, topoisomerase inhibition and others become less obvious. Recent cellular, epigenetic and microarray studies are beginning to decipher genistein effects that occur at dietarily relevant low concentrations. In toxicology, the well accepted principle of 'the dose defines the poison' applies to many toxicants and can be invoked, as herein, to distinguish genotoxic versus potentially beneficial in vitro effects of natural dietary products such as genistein

  9. Formation and removal of genotoxic activity during UV/H

    NARCIS (Netherlands)

    Heringa, M.B.; Harmsen, D.J.H.; Beerendonk, E.F.; Reus, A.A.; Krul, C.A.M.; Metz, D.H.; Ijpelaar, G.F.

    2011-01-01

    The objective of this study was to determine the genotoxic activity of water after UV/H2O2 oxidation and GAC filtration. Pre-treated surface water from three locations was treated with UV/H2O2 with medium pressure (MP) lamps and passed through granulated

  10. Mercury-induced genotoxicity in marine diatom (Chaetoceros tenuissimus)

    Digital Repository Service at National Institute of Oceanography (India)

    Sarker, S.; Desai, S.R.; Verlecar, X.N.; Sarker, M.S.; Sarkar, A.

    In this paper, we present an evaluation of genotoxic responses in marine diatom, Chaetoceros tenuissimus, isolated from Kandla Creek (lat 23.03° N, long 70.22° E), Gujarat, India, in terms of impairment of DNA integrity as a function...

  11. Genotoxicity and mutagenicity of solid waste leachates: A review

    African Journals Online (AJOL)

    user

    2013-07-03

    Jul 3, 2013 ... There is need for a shift from waste disposal to sustainable waste management. Awareness on possible health ... Key words: Solid waste leachate, genotoxicity, mutagenicity, environmental pollution. INTRODUCTION. Solid wastes .... landfills and incineration residues from Japan include persistent organic ...

  12. Genotoxic damage in cultured human peripheral blood lymphocytes ...

    African Journals Online (AJOL)

    Falaq Naz

    2012-06-29

    Jun 29, 2012 ... Genotoxic damage in cultured human peripheral blood lymphocytes of oral ... catechol estrogens and quinines, via redox reactions causes oxidative damage to .... volume was prepared for each donor. About, 0.8 ml of cell sus .... duce the adverse effects of OCs, such as the reduction in the estrogen content.

  13. QSAR ligand dataset for modelling mutagenicity, genotoxicity, and rodent carcinogenicity

    Directory of Open Access Journals (Sweden)

    Davy Guan

    2018-04-01

    Full Text Available Five datasets were constructed from ligand and bioassay result data from the literature. These datasets include bioassay results from the Ames mutagenicity assay, Greenscreen GADD-45a-GFP assay, Syrian Hamster Embryo (SHE assay, and 2 year rat carcinogenicity assay results. These datasets provide information about chemical mutagenicity, genotoxicity and carcinogenicity.

  14. Does Caesalpinia bonducella ameliorate genotoxicity? An in vitro ...

    African Journals Online (AJOL)

    The aim of the study is to investigate the antimutagenic and antigenotoxic potential of alcoholic extracts of C. bonducella against methyl methane sulfonate (MMS) induced genotoxicity. In this experiment we have used in vitro method i.e., human lymphocyte culture and in vivo method in bone marrow cells of albino mice, ...

  15. Evaluation of Genotoxic Pressure along the Sava River.

    Directory of Open Access Journals (Sweden)

    Stoimir Kolarević

    Full Text Available In this study we have performed a comprehensive genotoxicological survey along the 900 rkm of the Sava River. In total, 12 sites were chosen in compliance with the goals of GLOBAQUA project dealing with the effects of multiple stressors on biodiversity and functioning of aquatic ecosystems. The genotoxic potential was assessed using a complex battery of bioassays performed in prokaryotes and aquatic eukaryotes (freshwater fish. Battery comprised evaluation of mutagenicity by SOS/umuC test in Salmonella typhimurium TA1535/pSK1002. The level of DNA damage as a biomarker of exposure (comet assay and biomarker of effect (micronucleus assay and the level of oxidative stress as well (Fpg-modified comet assay was studied in blood cells of bleak and spirlin (Alburnus alburnus/Alburnoides bipunctatus respectively. Result indicated differential sensitivity of applied bioassays in detection of genotoxic pressure. The standard and Fpg-modified comet assay showed higher potential in differentiation of the sites based on genotoxic potential in comparison with micronucleus assay and SOS/umuC test. Our data represent snapshot of the current status of the river which indicates the presence of genotoxic potential along the river which can be traced to the deterioration of quality of the Sava River by communal and industrial wastewaters. The major highlight of the study is that we have provided complex set of data obtained from a single source (homogeneity of analyses for all samples.

  16. Genotoxicity evaluation of the insecticide ethion in root of Allium ...

    African Journals Online (AJOL)

    In this study, the genotoxic effects of ethion were investigated in the mitotic cell division of Allium cepa. Primary roots of A. cepa were treated with various concentrations (25, 50, 75, and 100%) of ethion solutions for different duration of time. The result revealed that increase in the concentration and duration of treatment ...

  17. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  18. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  19. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  20. Somatic cell genotoxicity at the glycophorin A locus in humans

    International Nuclear Information System (INIS)

    Jensen, R.H.; Grant, S.G.; Langlois, R.G.; Bigbee, W.L.

    1990-01-01

    We have developed an assay for detecting variant erythrocytes that occur as a result of in vivo allele loss at the glycophorin A (GPA) locus on chromosome 4 in humans. This gene codes for an erythroid- specific cell surface glycoprotein, and with our assay we are able to detect rare variant erythrocytes that have lost expression of one of the two GPA alleles. Two distinctly different variant cell types are detected with this assay. One variant cell type (called N OE) is hemizygous. Our assay also detects homozygous variant erythrocytes that have lost expression of the GPA(M) allele and express the GPA(N) allele at twice the heterozygous level. The results of this assay are an enumeration of the frequency of N OE and NN variant cell types for each individual analyzed. These variant cell frequencies provide a measure of the amount of somatic cell genotoxicity that has occurred at the GPA locus. Such genotoxicity could be the result of (1) reactions of toxic chemicals to which the individual has been exposed, or (2) high energy radiation effects on erythroid precursor cells, or (3) errors in DNA replication or repair in these cells of the bone marrow. Thus, the GPA-based variant cell frequency can serve as a biodosimeter that indicates the amount of genotoxic exposure each individual has received. Because two very different kinds of variant cells are enumerated, different kinds of genotoxicity should be distinguishable. Results of the GPA somatic genotoxicity assay may also provide valuable information for cancer-risk estimation on each individual. 16 refs

  1. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  2. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. The effects of exogenous proline and osmotic stress on morpho ...

    African Journals Online (AJOL)

    USER

    2010-06-21

    Jun 21, 2010 ... For evaluation of growth parameters of strawberry callus under osmotic stress and exogenous proline, embryonic calli were transferred to Murashige and Skoog (MS) medium containing four sucrose. (osmotic stress) treatments including 3, 6, 9 and 12% and various concentrations of exogenous L- proline ...

  5. The effects of exogenous proline and osmotic stress on morpho ...

    African Journals Online (AJOL)

    For evaluation of growth parameters of strawberry callus under osmotic stress and exogenous proline, embryonic calli were transferred to Murashige and Skoog (MS) medium containing four sucrose (osmotic stress) treatments including 3, 6, 9 and 12% and various concentrations of exogenous Lproline (0, 2.5, 5 and 10 ...

  6. Explaining Cigarette Smoking: An Endogenous-Exogenous Analysis.

    Science.gov (United States)

    McKillip, Jack

    Kruglanski's endogenous-exogenous partition, when applied to reasons given by smokers for smoking cigarettes, distinguishes two types of actions: (1) endogenous reasons implying that the behavior of consuming the cigarette is the goal of the action and the actor is positive toward the behavior, and (2) exogenous reasons implying that the behavior…

  7. Effect Of Exogenous Progesterone On Blood Chemistry Of Large ...

    African Journals Online (AJOL)

    Exogenous hormones are major economic factors in swine production. This study evaluate the effects of exogenous administration of progesterone on the blood chemistry of pigs.Experiment involved weekly injections of progesterone to 24 pigs (12 males and 12 females)from day old to 24 weeks and only corn oil to another ...

  8. The Endogenous-Exogenous Partition in Attribution Theory

    Science.gov (United States)

    Kruglanski, Arie W.

    1975-01-01

    Within lay explanation of actions, several significant inferences are assumed to follow from the partition between endogenous and exogenous attributions. An endogenous action is judged to constitute an end in itself; an exogenous action is judged to serve as a means to some further end. (Editor/RK)

  9. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  10. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  11. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  12. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  13. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  14. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  17. Genotoxicity of diuron and glyphosate in oyster spermatozoa and embryos.

    Science.gov (United States)

    Akcha, F; Spagnol, C; Rouxel, J

    2012-01-15

    We investigated the effects of genotoxicant exposure in gametes and embryos to find a possible link between genotoxicity and reproduction/developmental impairment, and explore the impact of chemical genotoxicity on population dynamics. Our study focused on the genotoxic effects of two herbicides on oyster gametes and embryos: glyphosate (both as an active substance and in the Roundup formulation) and diuron. France is Europe's leading consumer of agrochemical substances and as such, contamination of France's coastal waters by pesticides is a major concern. Glyphosate and diuron are among the most frequently detected herbicides in oyster production areas; as oyster is a specie with external reproduction, its gametes and embryos are in direct contact with the surrounding waters and are hence particularly exposed to these potentially dangerous substances. In the course of this study, differences in genotoxic and embryotoxic responses were observed in the various experiments, possibly due to differences in pollutant sensitivity between the tested genitor lots. Glyphosate and Roundup had no effect on oyster development at the concentrations tested, whereas diuron significantly affected embryo-larval development from the lowest tested concentration of 0.05 μg L⁻¹, i.e. an environmentally realistic concentration. Diuron may therefore have a significant impact on oyster recruitment rates in the natural environment. Our spermiotoxicity study revealed none of the tested herbicides to be cytotoxic for oyster spermatozoa. However, the alkaline comet assay showed diuron to have a significant genotoxic effect on oyster spermatozoa at concentrations of 0.05 μg L⁻¹ upwards. Conversely, no effects due to diuron exposure were observed on sperm mitochondrial function or acrosomal membrane integrity. Although our initial results showed no negative effect on sperm function, the possible impact on fertilization rate and the consequences of the transmission of damaged DNA for

  18. Genotoxicity of 2-bromo-3′-chloropropiophenone

    International Nuclear Information System (INIS)

    Meng, Fanxue; Yan, Jian; Li, Yan; Fu, Peter P.; Fossom, Linda H.; Sood, Ramesh K.; Mans, Daniel J.; Chu, Pei-I; Moore, Martha M.; Chen, Tao

    2013-01-01

    Impurities are present in any drug substance or drug product. They can be process-related impurities that are not completely removed during purification or are formed due to the degradation of the drug substance over the product shelf-life. Unlike the drug substance, impurities generally do not have beneficial effects and may present a risk without associated benefit. Therefore, their amount should be minimized. 2-Bromo-3′-chloropropiophenone (BCP) is an impurity of bupropion, a second-generation antidepressant and a smoking cessation aid. The United States Pharmacopeia recommends an acceptable level for BCP that is not more than 0.1% of the bupropion. Because exposure to genotoxic impurities even at low levels is of significant concern, it is important to determine whether or not BCP is genotoxic. Therefore, in this study the Ames test and the in vitro micronucleus assay were conducted to evaluate the genotoxicity of BCP. BCP was mutagenic with S9 metabolic activation, increasing the mutant frequencies in a concentration-dependent manner, up to 22- and 145-fold induction over the controls in Salmonella strains TA100 and TA1535, respectively. BCP was also positive in the in vitro micronucleus assay, resulting in up to 3.3- and 5.1-fold increase of micronucleus frequency for treatments in the absence and presence of S9, respectively; and 9.9- and 7.4-fold increase of aneuploidies without and with S9, respectively. The addition of N-acetyl-L-cysteine, an antioxidant, reduced the genotoxicity of BCP in both assays. Further studies showed that BCP treatment resulted in induction of reactive oxygen species (ROS) in the TK6 cells. The results suggest that BCP is mutagenic, clastogenic, and aneugenic, and that these activities are mediated via generation of reactive metabolites. - Highlights: • 2-Bromo-3′-chloropropiophenone is an impurity of bupropion. • BCP was positive in both the Ames test and the in vitro micronucleus assay. • It induced high frequencies of

  19. Genotoxicity of 2-bromo-3′-chloropropiophenone

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Fanxue; Yan, Jian; Li, Yan [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Fu, Peter P. [Division of Biochemical Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Fossom, Linda H.; Sood, Ramesh K.; Mans, Daniel J.; Chu, Pei-I [Center for Drug Evaluation and Research, Food and Drug Administration, 10903 New Hampshire Avenue, Silver Spring, MD 20993 (United States); Moore, Martha M. [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Chen, Tao, E-mail: tao.chen@fda.hhs.gov [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States)

    2013-07-15

    Impurities are present in any drug substance or drug product. They can be process-related impurities that are not completely removed during purification or are formed due to the degradation of the drug substance over the product shelf-life. Unlike the drug substance, impurities generally do not have beneficial effects and may present a risk without associated benefit. Therefore, their amount should be minimized. 2-Bromo-3′-chloropropiophenone (BCP) is an impurity of bupropion, a second-generation antidepressant and a smoking cessation aid. The United States Pharmacopeia recommends an acceptable level for BCP that is not more than 0.1% of the bupropion. Because exposure to genotoxic impurities even at low levels is of significant concern, it is important to determine whether or not BCP is genotoxic. Therefore, in this study the Ames test and the in vitro micronucleus assay were conducted to evaluate the genotoxicity of BCP. BCP was mutagenic with S9 metabolic activation, increasing the mutant frequencies in a concentration-dependent manner, up to 22- and 145-fold induction over the controls in Salmonella strains TA100 and TA1535, respectively. BCP was also positive in the in vitro micronucleus assay, resulting in up to 3.3- and 5.1-fold increase of micronucleus frequency for treatments in the absence and presence of S9, respectively; and 9.9- and 7.4-fold increase of aneuploidies without and with S9, respectively. The addition of N-acetyl-L-cysteine, an antioxidant, reduced the genotoxicity of BCP in both assays. Further studies showed that BCP treatment resulted in induction of reactive oxygen species (ROS) in the TK6 cells. The results suggest that BCP is mutagenic, clastogenic, and aneugenic, and that these activities are mediated via generation of reactive metabolites. - Highlights: • 2-Bromo-3′-chloropropiophenone is an impurity of bupropion. • BCP was positive in both the Ames test and the in vitro micronucleus assay. • It induced high frequencies of

  20. Comparative genotoxicity testing of Rhine river sediment extracts using the comet assay with permanent fish cell lines (RTG-2 and RTL-W1) and the Ames test

    Energy Technology Data Exchange (ETDEWEB)

    Kosmehl, T.; Braunbeck, T.; Hollert, H. [Dept. of Zoology, Aquatic Ecology and Toxicology Section, Univ. of Heidelberg (Germany); Krebs, F.; Manz, W. [German Federal Inst. of Hydrology, Koblenz (Germany); Erdinger, L. [Dept. for Hygiene and Medical Microbiology, Inst. for Hygiene, Univ. of Heidelberg (Germany)

    2004-07-01

    Whilst at least in Germany assessment strategies on the basis of chemical analysis and acute toxicity data dominated the last decades, the development of more specific biological endpoints and biomarkers in ecotoxicology is required in order to arrive at a good ecological potential and good chemical status of surface waters in the European river basins until the year 2015, as required by the European Water Framework Directive. Since sediments have for long been known to function both as a sink and as a source of pollutants in aquatic systems, and since part of the particle-associated substances have frequently been demonstrated to cause mutagenic and carcinogenic effects in aquatic organisms, particularly in fish, there is, among other requirements, an urgent need to develop, standardize and implement integrated vertebrate-based test systems addressing genotoxicity into recent sediment investigation strategies. Thus, the present study was designed to compare the suitability of two commonly used test systems, the comet assay and the Ames test, for the evaluation of the ecotoxicological burden of surface and core sediment samples from the river Rhine. Methods (or main features). In order to determine the importance of inherent enzymatic activities, two permanent fish cell lines with different biotransformation capacities, RTL-W1 and RTG-2, were compared with respect to their capability of detecting genotoxic effects in 18 surface and core sediment samples from 9 locations along the river Rhine in the comet assay with and without exogenous bioactivation. For further comparison, as a prokaryotic mutagenicity assay, the Salmonella plate incorporation assay (Ames test) with the test strains TA98 and TA100 with and without exogenous metabolic activation was used. Results and discussion. Whereas all sediment extracts induced genotoxic effects in the comet assay with RTL-W1 cells, only 12 out of 18 sediment extracts revealed significant genotoxicity in the tests with the

  1. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  2. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  3. CENTRAL SEROUS CHORIORETINOPATHY IN POSTMENOPAUSAL WOMEN RECEIVING EXOGENOUS TESTOSTERONE.

    Science.gov (United States)

    Conway, Mandi D; Noble, Jason A; Peyman, Gholam A

    2017-01-01

    Central serous chorioretinopathy (CSR) is a serous detachment of the neurosensory retina commonly associated with male sex, Type-A personality and corticosteroid use. Exogenous administration of androgens and development of CSR in men has been reported. Only one case of CSR in a postmenopausal woman receiving exogenous androgen therapy has been reported. The authors describe three cases of chronic CSR in postmenopausal women receiving exogenous testosterone therapy. Diagnosis was based on characteristic clinical, fluorescein angiographic, and optical coherence tomography findings. The three women were being treated with exogenous testosterone and progesterone therapy for symptoms of menopause and libido loss. Average age at presentation was 54.7 years (53-56 years), average duration of exogenous androgen use was 61 months (36-87 months), with average 19.7-month follow-up. Resolution of symptoms seemed correlated with cessation of androgen use despite treatment with oscillatory photodynamic therapy and intravitreal pharmacotherapy with antivascular endothelial growth factor agents. Exogenous testosterone is increasingly prescribed for menopausal symptoms and libido loss. Treatment with oscillatory photodynamic therapy, supplemental bevacizumab intravitreal pharmacotherapy, and cessation of exogenous androgen therapy was successful in three cases of chronic, therapy-resistant CSR. Ophthalmologists should inquire about androgen usage in patients who present with CSR, especially in the setting of therapy resistance.

  4. Genotoxicity of topoisomerase II inhibitors: An anti-infective perspective

    International Nuclear Information System (INIS)

    Smart, Daniel J.

    2008-01-01

    At present, an inevitable consequence of a chemical's inhibitory activity on key regulators of DNA topology in bacteria, the type II topoisomerases, is a less pronounced effect on their eukaryotic counterparts. In the context of anti-infectives drug development, this may pose a risk to patient safety as inhibition of eukaryotic type II topoisomerases (TOPO II) can result in the generation of DNA double-strand breaks (DSBs), which have the potential to manifest as mutations, chromosome breakage or cell death. The biological effects of several TOPO II inhibitors in mammalian cells are described herein; their modulation of DSB damage response parameters is examined and evidence for the existence of a threshold concept for genotoxicity and its relevance in safety assessment is discussed. The potential utility of γH2AX, a promising and highly sensitive molecular marker for DSBs, in a novel genotoxicity 'pre-screen' to conventional assays is also highlighted

  5. Genotoxicity of indium tin oxide by comet test

    Directory of Open Access Journals (Sweden)

    İbrahim Hakkı Ciğerci

    2015-06-01

    Full Text Available Indium tin oxide (ITO is used for liquid crystal display (LCDs, electrochromic displays, flat panel displays, field emission displays, touch or laptop computer screens, cell phones, energy conserving architectural windows, defogging aircraft and automobile windows, heat-reflecting coatings to increase light bulb efficiency, gas sensors, antistatic window coatings, wear resistant layers on glass, nanowires and nanorods because of its unique properties of high electrical conductivity, transparency and mechanical resistance.Genotoxic effects of ITO were investigated on the root cells of Allium cepa by Comet assay. A. cepa roots were treated with the aqueous dispersions of ITO at 5 different concentrations (12.5, 25, 50, 75, and 100 ppm for 4 h. A significant increase in DNA damage was a observed at all concentrations of ITO by Comet assay. These result indicate that ITO exhibit genotoxic activity in A. cepa root meristematic cells.

  6. Genotoxicity of unmodified and organo-modified montmorillonite

    DEFF Research Database (Denmark)

    Sharma, Anoop Kumar; Schmidt, Bjørn; Frandsen, Henrik Lauritz

    2010-01-01

    absent in the filtered samples, which was independently confirmed by dynamic light-scattering measurements. Detection and identification of free quaternary ammonium modifier in the filtered sample was carried out by HPLC-Q-TOF/MS and revealed a total concentration of a mixture of quaternary ammonium...... assay, none of the clays produced ROS in a cell-free test system (the DCFH-DA assay). Inductively coupled plasma mass-spectrometry (ICP-MS) was used to detect clay particles in the filtered samples using aluminium as a tracer element characteristic to clay. The results indicated that clay particles were...... analogues of 1.57 mu g/ml. These findings suggest that the genotoxicity of organo-modified montmorillonite was caused by the organo-modifier. The detected organo-modifier mixture was synthesized and comet-assay results showed that the genotoxic potency of this synthesized organo-modifier was in the same...

  7. Genotoxicity of gemfibrozil in the gilthead seabream (Sparus aurata).

    Science.gov (United States)

    Barreto, A; Luis, L G; Soares, A M V M; Paíga, P; Santos, L H M L M; Delerue-Matos, C; Hylland, K; Loureiro, S; Oliveira, M

    2017-09-01

    Widespread use of pharmaceuticals and suboptimal wastewater treatment have led to increased levels of these substances in aquatic ecosystems. Lipid-lowering drugs such as gemfibrozil, which are among the most abundant human pharmaceuticals in the environment, may have deleterious effects on aquatic organisms. We examined the genotoxicity of gemfibrozil in a fish species, the gilthead seabream (Sparus aurata), which is commercially important in southern Europe. Following 96-h waterborne exposure, molecular (erythrocyte DNA strand breaks) and cytogenetic (micronuclei and other nuclear abnormalities in cells) endpoints were measured. Gemfibrozil was positive in both endpoints, at environmentally relevant concentrations, a result that raises concerns about the potential genotoxic effects of the drug in recipient waters. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Genotoxicity of extracts of Japanese traditional herbal medicines (Kampo)

    OpenAIRE

    Makoto, Katami; Haruo, Kuboniwa; Shunichi, Maemura; Toshihiko, Yanagisawa; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.

    2002-01-01

    The possible genotoxicity potential of 128 Japanese traditional herbal medicines (Kampo) was investigated using a bacterial reverse mutation test (the Ames test), an in vivo micronucleus test (MN test) in mouse bone marrow cells and an unscheduled DNA synthesis test (UDS test) in rat hepatocytes. Of 128 Kampo extracts examined, 98 did not induce mutations in bacteria while 30 induced mutations weakly in Salmonella typhimurium TA1537. Extracts of Scutellariae Radix, a common herbal drug, and i...

  9. Brain imaging with 123I-IMP-SPECT in migraine between attacks

    International Nuclear Information System (INIS)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.; Husstedt, I.W.

    1989-01-01

    123 I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migraine attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors

  10. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  11. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  12. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  13. Evaluation of river water genotoxicity using the piscine micronucleus test.

    Science.gov (United States)

    Ergene, Serap; Cavaş, Tolga; Celik, Ayla; Köleli, Nurcan; Aymak, Cemil

    2007-07-01

    The Berdan River, which empties into the Mediterranean Sea on the east coast of Turkey, receives discharges of industrial and municipal waste. In the present study, the in vivo piscine micronucleus (MN) test was used to evaluate the genotoxicity of water samples collected from different locations along the Berdan River. Nile tilapia (Oreochromis niloticus) were exposed in the laboratory for 2, 4, and 6 days, and micronuclei were evaluated in peripheral blood erythrocytes, gill cells, and caudal fin epithelial cells. A single dose of 5 mg/L cyclophosphamide was used as a positive control. In addition to micronuclei, nuclear abnormalities (NAs), such as binucleated cells and blebbed, notched, and lobed nuclei, were assessed in the erythrocytes, and chemical analyses were carried out to determine the amount of heavy metals in the water samples. MN and NA frequencies were significantly elevated (up to 2- to 3-fold) in fish exposed to river water samples taken downstream of potential discharges, and the elevated responses in gill and fin cells were related to the concentration of heavy metals in the water. MN frequencies (expressed as micronucleated cells/1,000 cells), in both treated and untreated fish, were greatest in gill cells (range: 0.80-3.70), and generally lower in erythrocytes (range: 0.50-2.80), and fin cells (range: 0.45-1.70). The results of this study indicate that the Berdan River is contaminated with genotoxic pollutants and that the genotoxicity is related to the discharge of wastes into the river water.

  14. Genotoxic evaluation of terbinafine in human lymphocytes in vitro.

    Science.gov (United States)

    Tolomeotti, Danielle; de Castro-Prado, Marialba Avezum Alves; de Sant'Anna, Juliane Rocha; Martins, Ana Beatriz Tozzo; Della-Rosa, Valter Augusto

    2015-01-01

    Terbinafine is an antimycotic drug usually used against several superficial fungal infections and with a potential application in the treatment of human cancers. Since to date there are few data on the genotoxic effects of terbinafine in mammalian cells, current study evaluated the potential genotoxic of such antifungal agent in cultured human peripheral blood lymphocytes. Terbinafine was used at the peak plasma concentration (1.0 μg/ml) and in four additional concentrations higher than the human plasmatic peak (5.0 μg/ml, 25.0 μg/ml, 50.0 μg/ml and 100.0 μg/ml). Chromosomal aberrations (CA), sister chromatid exchanges (SCE), micronuclei (MN), nucleoplasmic bridges (NP) and nuclear buds (NB) were scored as genetic endpoints. In all analysis no significant differences (α = 0.05, Kruskal-Wallis test) were observed. Complementary criterion adopted to obtain the final response in cytogenetic agreed with statistical results. Therefore, results of this study showed that terbinafine neither induced CA, SCE, MN, NP and NB nor affected significantly mitotic, replication and cytokinesis-block proliferation indices in any of the tested concentrations. It may be assumed that terbinafine was not genotoxic or cytotoxic to cultured human peripheral blood lymphocytes in our experimental conditions.

  15. Genotoxic and apoptotic effects of Goeckerman therapy for psoriasis

    Energy Technology Data Exchange (ETDEWEB)

    Borska, L.; Andrys, C.; Krejsek, J.; Hamakova, K.; Kremlacek, J.; Palicka, V.; Ranna, D.; Fiala, Z. [Charles University Prague, Prague (Czech Republic). Faculty of Medicine

    2010-03-15

    Goeckerman therapy (GT) for psoriasis is based on cutaneous application of crude coal tar (polycyclic aromatic hydrocarbons (PAH)) and exposure to ultraviolet radiation (UVR). PAH and UVR are mutagenic, carcinogenic and immunotoxic agents that promote apoptosis. We evaluated dermal absorption of PAH as well as the genotoxic and apoptotic effects of GT in 20 patients with psoriasis, by determining numbers of chromosomal abnormalities in peripheral lymphocytes, and levels of 1-hydroxypyrene (1-OHP), p53 protein and soluble FasL (sFasL) in urine and/or blood, before and after GT. Psoriasis Area and Severity Index (PASI) score was used to evaluate clinical efficacy of GT. Compared with pre-treatment levels, there was a significant increase in urine 1-OHP, indicating a high degree of dermal absorption of PAH (P <0.01). We also found a significant increase in the number of chromosomal abnormalities in peripheral blood lymphocytes (P <0.001), suggesting that GT is genotoxic; significantly increased p53 protein in plasma (P <0.05), an indicator of cell response to DNA damage; and significantly increased sFasL in serum (P <0.01), an indicator of apoptosis. The PASI score was significantly decreased after GT (P <0.001), confirming clinical benefit of this treatment. Our results demonstrate high dermal absorption of PAH during GT and provide evidence that GT promotes genotoxicity and apoptosis.

  16. Borax counteracts genotoxicity of aluminum in rat liver.

    Science.gov (United States)

    Turkez, Hasan; Geyikoğlu, Fatime; Tatar, Abdulgani

    2013-10-01

    This study was carried out to evaluate the protective role of borax (BX) on genotoxicity induced by aluminum (Al) in rat liver, using liver micronucleus assay as an indicator of genotoxicity. Sprague-Dawley rats were randomly separated into six groups and each group had four animals. Aluminum chloride (AlCl₃; 5 mg/kg b.w.) and BX (3.25 and 13 mg/kg b.w.) were injected intraperitoneally to rats. Besides, animals were also treated with Al for 4 consecutive days followed by BX for 10 days. Rats were anesthetized after Al and BX injections and the hepatocytes were isolated for counting the number of micronucleated hepatocytes (MNHEPs). AlCl₃ was found to significantly (p < 0.05) increase the number of MNHEPs. Rats treated with BX, however, showed no increase in MNHEPs. Moreover, simultaneous treatments with BX significantly modulated the genotoxic effects of AlCl₃ in rats. It can be concluded that BX has beneficial influences and has the ability to antagonize Al toxicity.

  17. Molecular and cytogenetic assessment of Dipterygium glaucum genotoxicity

    Directory of Open Access Journals (Sweden)

    NADA H. ALTWATY

    2016-01-01

    Full Text Available ABSTRACT The aim of the present study is to assess the genotoxicity of Dipterygium glaucum grows widely in Saudi Arabia desert to produce safety herbal products. This work is considered the first and pioneer report so far due to the lack and poor evaluated reports of the plant species for their mutagensity, genotoxicity and cytogenetics effects. Cytogenetic effects of D. glaucum on mitotic in roots of Vicia faba showed reduction in mitotic activity using three extracts; water, ethanol and ethyl acetate. Chromosomal abnormalities were recorded that included stickiness of chromosomes, chromatin bridge, fragments, lagging chromosome and micronuclei. Protein bands and RAPD analyses of V. faba treated with three D. glaucum extracts revealed some newly induced proteins and DNA fragments and other disappeared. Chemical constitution of the plant species should be identified with their biological activities against human and animal cells like HeLa cancer cell line. We are recommending using additional genotoxicity tests and other toxicity tests on animal culture with different concentrations and also utilizing several drought and heat tolerant genes of the plant species in gene cloning to develop and improve other economical crop plants instead of using the species as oral herbal remedy

  18. Genotoxicity risk assessment of diversely substituted quinolines using the SOS chromotest.

    Science.gov (United States)

    Duran, Leidy Tatiana Díaz; Rincón, Nathalia Olivar; Galvis, Carlos Eduardo Puerto; Kouznetsov, Vladimir V; Lorenzo, Jorge Luis Fuentes

    2015-03-01

    Quinolines are aromatic nitrogen compounds with wide therapeutic potential to treat parasitic and microbial diseases. In this study, the genotoxicity of quinoline, 4-methylquinoline, 4-nitroquinoline-1-oxide (4-NQO), and diversely functionalized quinoline derivatives and the influence of the substituents (functional groups and/or atoms) on their genotoxicity were tested using the SOS chromotest. Quinoline derivatives that induce genotoxicity by the formation of an enamine epoxide structure did not induce the SOS response in Escherichia coli PQ37 cells, with the exception of 4-methylquinoline that was weakly genotoxic. The chemical nature of the substitution (C-5 to C-8: hydroxyl, nitro, methyl, isopropyl, chlorine, fluorine, and iodine atoms; C-2: phenyl and 3,4-methylenedioxyphenyl rings) of quinoline skeleton did not significantly modify compound genotoxicities; however, C-2 substitution with α-, β-, or γ-pyridinyl groups removed 4-methylquinoline genotoxicity. On the other hand, 4-NQO derivatives whose genotoxic mechanism involves reduction of the C-4 nitro group were strong inducers of the SOS response. Methyl and nitrophenyl substituents at C-2 of 4-NQO core affected the genotoxic potency of this molecule. The relevance of these results is discussed in relation to the potential use of the substituted quinolines. The work showed the sensitivity of SOS chromotest for studying structure-genotoxicity relationships and bioassay-guided quinoline synthesis. © 2013 Wiley Periodicals, Inc.

  19. Workshop. Assessment of Occupational and Environmental Exposure to Genotoxic Substances - a Methodological Approach

    International Nuclear Information System (INIS)

    2000-01-01

    During the workshop various works concerning radiobiology, environmental and occupational medicine were presented. Exposure to genotoxic and carcinogenic agents, like ionizing radiation, aromatic hydrocarbons, herbicides, pesticides was investigated

  20. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  1. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  2. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  3. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  4. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  5. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  6. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  7. New investigations into the genotoxicity of cobalt compounds and their impact on overall assessment of genotoxic risk

    OpenAIRE

    Kirkland, David; Brock, Tom; Haddouk, Hasnaà; Hargeaves, Victoria; Lloyd, Melvyn; Mc Garry, Sarah; Proudlock, Raymond; Sarlang, Séverine; Sewald, Katherina; Sire, Guillaume; Sokolowski, Andrea; Ziemann, Christina

    2015-01-01

    The genotoxicity of cobalt metal and cobalt compounds has been widely studied. Several publications show induction of chromosomal aberrations, micronuclei or DNA damage in mammalian cells in vitro in the absence of S9. Mixed results were seen in gene mutation studies in bacteria and mammalian cells in vitro, and in chromosomal aberration or micronucleus assays in vivo. To resolve these inconsistencies, new studies were performed with soluble and poorly soluble cobalt compounds according to OE...

  8. High throughput comet assay to study genotoxicity of nanomaterials

    Directory of Open Access Journals (Sweden)

    Naouale El Yamani

    2015-06-01

    Full Text Available The unique physicochemical properties of engineered nanomaterials (NMs have accelerated their use in diverse industrial and domestic products. Although their presence in consumer products represents a major concern for public health safety, their potential impact on human health is poorly understood. There is therefore an urgent need to clarify the toxic effects of NMs and to elucidate the mechanisms involved. In view of the large number of NMs currently being used, high throughput (HTP screening technologies are clearly needed for efficient assessment of toxicity. The comet assay is the most used method in nanogenotoxicity studies and has great potential for increasing throughput as it is fast, versatile and robust; simple technical modifications of the assay make it possible to test many compounds (NMs in a single experiment. The standard gel of 70-100 μL contains thousands of cells, of which only a tiny fraction are actually scored. Reducing the gel to a volume of 5 μL, with just a few hundred cells, allows twelve gels to be set on a standard slide, or 96 as a standard 8x12 array. For the 12 gel format, standard slides precoated with agarose are placed on a metal template and gels are set on the positions marked on the template. The HTP comet assay, incorporating digestion of DNA with formamidopyrimidine DNA glycosylase (FPG to detect oxidised purines, has recently been applied to study the potential induction of genotoxicity by NMs via reactive oxygen. In the NanoTEST project we investigated the genotoxic potential of several well-characterized metal and polymeric nanoparticles with the comet assay. All in vitro studies were harmonized; i.e. NMs were from the same batch, and identical dispersion protocols, exposure time, concentration range, culture conditions, and time-courses were used. As a kidney model, Cos-1 fibroblast-like kidney cells were treated with different concentrations of iron oxide NMs, and cells embedded in minigels (12

  9. Genotoxicity of 1,3-dichloro-2-propanol in the SOS chromotest and in the Ames test. Elucidation of the genotoxic mechanism.

    Science.gov (United States)

    Hahn, H; Eder, E; Deininger, C

    1991-01-01

    1,3-Dichloro-2-propanol (1,3-DCP-OH, glycerol dichlorohydrin) is of great importance in many industrial processes and has been detected in foodstuffs, in particular in soup spices and instant soups. It has been shown to be carcinogenic, genotoxic and mutagenic. Its genotoxic mechanisms are, however, not yet entirely understood. We have investigated whether alcohol dehydrogenase (ADH) catalysed activation to the highly mutagenic and carcinogenic 1,3-dichloroacetone or formation of epichlorohydrin or other genotoxic compounds play a role for mutagenicity and genotoxicity. In our studies, no indications of ADH catalysed formation of 1,3-dichloropropane could be found, although we could demonstrate a clear activation by ADH in the case of 2-chloropropenol. Formation of allyl chloride could also be excluded. We found, however, clear evidence that epichlorohydrin formed chemically in the buffer and medium used in the test is responsible for genotoxicity. No indication was found that enzymatic formation of epichlorohydrin plays a role. Additional mutagenicity and genotoxicity studies with epichlorohydrin also confirmed the hypothesis that genotoxic effects of 1,3-DCP-OH depend on the chemical formation of epichlorohydrin.

  10. Mixed Causal-Noncausal Autoregressions with Strictly Exogenous Regressors

    NARCIS (Netherlands)

    Hecq, Alain; Issler, J.V.; Telg, Sean

    2017-01-01

    The mixed autoregressive causal-noncausal model (MAR) has been proposed to estimate economic relationships involving explosive roots in their autoregressive part, as they have stationary forward solutions. In previous work, possible exogenous variables in economic relationships are substituted into

  11. The use of exogenous microbial species to enhance the ...

    African Journals Online (AJOL)

    film bioreactor with exogenous bacterial and diatoma species would increase the removal of chemical oxygen demand, nitrogenous compounds and suspended solids from a real-time coal gasification wastewater to meet environmental ...

  12. Effect of exogenously added rhamnolipids on citric acid production ...

    African Journals Online (AJOL)

    Effect of exogenously added rhamnolipids on citric acid production yield. Wojciech Białas, Roman Marecik, Alicja Szulc, Łukasz Ławniczak, Łukasz Chrzanowski, Filip Ciesielczyk, Teofil Jesionowski, Andreas Aurich ...

  13. Isolating Exogenous and Endogenous Modes of Temporal Attention

    Science.gov (United States)

    Lawrence, Michael A.; Klein, Raymond M.

    2013-01-01

    The differential allocation of information processing resources over time, here termed "temporal attention," may be achieved by relatively automatic "exogenous" or controlled "endogenous" mechanisms. Over 100 years of research has confounded these theoretically distinct dimensions of temporal attention. The current…

  14. Radioprotective effect of exogenic hypoxia in fractionated irradiation

    International Nuclear Information System (INIS)

    Kazymbetov, P.; Yarmonenko, S.P.; Vajnson, A.A.

    1988-01-01

    During the experiments with mice it is established, that exogenic hypoxia protective effect (8%O 2 ), evaluated according to survival rate, decreases at the change from single to fractionated irradiation. Dose change factor (DCF) is equal to 1.55 and 1.22-1.31, respectively. Skin protection using exogenic hypoxia at the local fractionated irradiation is expressed more, than at the fractionated one. DCF is equal to 1.56 and 1.28, respectively. Exogenic hypoxia protection effect in the tumor is expressed rather weakly. DCF at single and fractionated irradiation constitutes 1.03 and 1.07-1.13, respectively. Due to skin preferential protection the therapeutic gain factor at irradiation under the exogenic hypoxia conditions constitutes 1.24 and 1.38-1.46, respectively, at single and fractionated irradiation

  15. Minnesota urban partnership agreement national evaluation : exogenous factors test plan.

    Science.gov (United States)

    2009-11-17

    This report presents the exogenous factors test plan for the national evaluation of the Minnesota Urban Partnership Agreement (UPA) under the United States Department of Transportation (U.S. DOT) UPA Program. The Minnesota UPA projects focus on reduc...

  16. Effects of exogenous polyamines and inhibitors of polyamine ...

    African Journals Online (AJOL)

    guanylhydrazone) (MGBG) and dicyclohexylamine (DCHA) or three exogenous polyamines (putrescine, spermidine and spermine) were added into a modified HLM-1 maturation medium inoculated with embryogenic tissues. Medium responses were ...

  17. Is subclinical hypothyroidism increasing exogen obesity in children?

    Directory of Open Access Journals (Sweden)

    Ceyda Tuna Kirsaclioglu

    2015-03-01

    Conclusion:.Thyrotropin releasing hormone stimulation test may be helpful to determine subclinical hypothyroidism in exogen obese children, if basal TSH levels were elevated. [J Contemp Med 2015; 5(1.000: 1-7

  18. Spatial orienting around the fovea: exogenous and endogenous cueing effects.

    Science.gov (United States)

    Yang, Taoxi; Zhang, Jiyuan; Bao, Yan

    2015-09-01

    The effect of covert attention in perifoveal and peripheral locations has been studied extensively. However, it is less clear whether attention operates similarly in the foveal area itself. The present study aims to investigate whether the attentional orienting elicited by an exogenous or endogenous cue can operate within the foveal area and whether attentional orienting operates similarly between foveal and perifoveal regions. By manipulating exogenous orienting in Experiment 1 and endogenous orienting in Experiment 2, we observed both forms of cueing in the foveal area. Specifically, we observed a larger exogenous cue-induced inhibitory effect (i.e., inhibition of return effect) and a similar endogenous cue-elicited facilitatory effect for the perifoveal relative to the foveal targets. We conclude that exogenous and endogenous orienting subject to two independent attentional systems with distinct modulation patterns in the foveal area.

  19. Exogenous application of plant growth regulators increased the total ...

    African Journals Online (AJOL)

    PRECIOUS

    2009-11-02

    Nov 2, 2009 ... the exogenous application of flavonoids reports plant growth regulation ... method used for extraction and quantification of endogenous gibberellins was ... 365 nm) while separation was done on a C18 reverse-phase HPLC.

  20. Induced effect of irradiated exogenous DNA on wheat

    International Nuclear Information System (INIS)

    Li Zhongjie; Sun Guangzu; Wang Guangjin

    1996-01-01

    Irradiated exogenous DNA introduced into wheat can give rise to break of DNA-chain and damage of part of alkali radicals. Introducing exogenous DNA irradiated by γ rays could increase Do fructification rate and decrease seed size and plumpness. These tendencies became obvious with dose increase. In comparison with control DNA, introducing DNA irradiated could raise evidently mutagenic effect of pollen tube pathway technique

  1. Exogenous (automatic) attention to emotional stimuli: a review

    OpenAIRE

    Carretié, Luis

    2014-01-01

    Current knowledge on the architecture of exogenous attention (also called automatic, bottom-up, or stimulus-driven attention, among other terms) has been mainly obtained from studies employing neutral, anodyne stimuli. Since, from an evolutionary perspective, exogenous attention can be understood as an adaptive tool for rapidly detecting salient events, reorienting processing resources to them, and enhancing processing mechanisms, emotional events (which are, by definition, salient for the in...

  2. Interaction between endogenous and exogenous orienting in crossmodal attention.

    Science.gov (United States)

    Chen, Xiaoxi; Chen, Qi; Gao, Dingguo; Yue, Zhenzhu

    2012-08-01

    Using a cue-target paradigm, we investigated the interaction between endogenous and exogenous orienting in cross-modal attention. A peripheral (exogenous) cue was presented after a central (endogenous) cue with a variable time interval. The endogenous and exogenous cues were presented in one sensory modality (auditory in Experiment 1 and visual in Experiment 2) whereas the target was presented in another modality. Both experiments showed a significant endogenous cuing effect (longer reaction times in the invalid condition than in the valid condition). However, exogenous cuing produced a facilitatory effect in both experiments in response to the target when endogenous cuing was valid, but it elicited a facilitatory effect in Experiment 1 and an inhibitory effect in Experiment 2 when endogenous cuing was invalid. These findings indicate that endogenous and exogenous cuing can co-operate in orienting attention to the crossmodal target. Moreover, the interaction between endogenous and exogenous orienting of attention is modulated by the modality between the cue and the target. © 2012 The Authors. Scandinavian Journal of Psychology © 2012 The Scandinavian Psychological Associations.

  3. P-wave dispersion in endogenous and exogenous subclinical hyperthyroidism.

    Science.gov (United States)

    Gen, R; Akbay, E; Camsari, A; Ozcan, T

    2010-02-01

    The aim of this study was to measure maximum P wave duration (Pmax) and P wave dispersion (PWD), which can be indicators for the risk of paroxysmal atrial fibrillation when increased, and to reveal their relationship with thyroid hormone levels in patients with endogenous and exogenous subclinical hyperthyroidism. Seventy-one patients with sublinical thyrotoxicosis (34 endogenous, 37 exogenous) and 69 healthy individuals were enrolled in the study. Pmax and minimum P wave duration (Pmin) on electrocardiogram recordings were measured and PWD was calculated as Pmax-Pmin. Pmax (pendogenous subclinical hyperthyroidism compared with the control group. Pmax (pexogenous subclinical thyrotoxicosis compared with the control group. Pmax (p=0.710) and PWD (p=0.127) were not significantly different in patients with endogenous subclinical hyperthyroidism compared with exogenous subclinical hyperthyroid patients. Pmax and PWD negatively associated with TSH in endogenous and exogenous subclinical hyperthyroidism. In the present study, we observed that Pmax and PWD were longer in patients with endogenous and exogenous subclinical hyperthyroidism. Lack of a difference in Pmax and PWD between patients with endogenous and exogenous subclinical hyperthyroidism seems to support the idea that hormone levels rather than the etiology of thyrotoxicosis affect the heart.

  4. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  5. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  6. Quantitative genotoxicity assays for analysis of medicinal plants: A systematic review.

    Science.gov (United States)

    Sponchiado, Graziela; Adam, Mônica Lucia; Silva, Caroline Dadalt; Soley, Bruna Silva; de Mello-Sampayo, Cristina; Cabrini, Daniela Almeida; Correr, Cassyano Januário; Otuki, Michel Fleith

    2016-02-03

    Medicinal plants are known to contain numerous biologically active compounds, and although they have proven pharmacological properties, they can cause harm, including DNA damage. Review the literature to evaluate the genotoxicity risk of medicinal plants, explore the genotoxicity assays most used and compare these to the current legal requirements. A quantitative systematic review of the literature, using the keywords "medicinal plants", "genotoxicity" and "mutagenicity", was undertakenQ to identify the types of assays most used to assess genotoxicity, and to evaluate the genotoxicity potential of medicinal plant extracts. The database searches retrieved 2289 records, 458 of which met the inclusion criteria. Evaluation of the selected articles showed a total of 24 different assays used for an assessment of medicinal plant extract genotoxicity. More than a quarter of those studies (28.4%) reported positive results for genotoxicity. This review demonstrates that a range of genotoxicity assay methods are used to evaluate the genotoxicity potential of medicinal plant extracts. The most used methods are those recommended by regulatory agencies. However, based on the current findings, in order to conduct a thorough study concerning the possible genotoxic effects of a medicinal plant, we indicate that it is important always to include bacterial and mammalian tests, with at least one in vivo assay. Also, these tests should be capable of detecting outcomes that include mutation induction, clastogenic and aneugenic effects, and structural chromosome abnormalities. In addition, the considerable rate of positive results detected in this analysis further supports the relevance of assessing the genotoxicity potential of medicinal plants. Copyright © 2016. Published by Elsevier Ireland Ltd.

  7. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  8. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  9. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  10. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  12. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. Observations of the effect of atmospheric processes on the genotoxic potency of airborne particulate matter

    DEFF Research Database (Denmark)

    Feilberg, Anders; Nielsen, Torben; Binderup, Mona-Lise

    2002-01-01

    In this study, the relationship between genotoxic potency and the occurrence of polycyclic aromatic hydrocarbons (PAH), including benzo(a)pyrene (BaP), and nitro-PAH in urban and semi-rural air masses has been investigated. The Salmonella/microsome assay has been used as a measure of genotoxic po...

  16. Primary genotoxicity in the liver following pulmonary exposure to carbon black nanoparticles in mice

    DEFF Research Database (Denmark)

    Modrzynska, Justyna; Berthing, Trine; Ravn-Haren, Gitte

    2018-01-01

    Background Little is known about the mechanism underlying the genotoxicity observed in the liver following pulmonary exposure to carbon black (CB) nanoparticles (NPs). The genotoxicity could be caused by the presence of translocated particles or by circulating inflammatory mediators released during...

  17. Proteome-wide Identification of Poly(ADP-Ribosyl)ation Targets in Different Genotoxic Stress Responses

    DEFF Research Database (Denmark)

    Jungmichel, S.; Rosenthal, F.; Altmeyer, M.

    2013-01-01

    . Nuclear proteins encompassing nucleic acid binding properties are prominently PARylated upon genotoxic stress, consistent with the nuclear localization of ARTD1/PARP1 and ARTD2/PARP2. Distinct differences in proteins becoming PARylated upon various genotoxic insults are observed, exemplified...

  18. Lack of genotoxicity in vivo for food color additive Tartrazine.

    Science.gov (United States)

    Bastaki, Maria; Farrell, Thomas; Bhusari, Sachin; Pant, Kamala; Kulkarni, Rohan

    2017-07-01

    Tartrazine is approved as a food color additive internationally with INS number 102, in the United States as food color subject to batch certification "Food, Drug, and Cosmetic" (FD&C) Yellow No. 5, and in Europe as food color additive with E number 102. In their evaluation of the color (2013), the European Food Safety Authority (EFSA) expressed concerns of potential genotoxicity, based primarily on one genotoxicity study that was not conducted according to Guidelines. The present in vivo genotoxicity study was conducted according to OECD Guidelines in response to EFSA's request for additional data. The animal species and strain, and the tissues examined were selected specifically to address the previously reported findings. The results of this study show clear absence of genotoxic activity for Tartrazine, in the bone marrow micronucleus assay and the Comet assay in the liver, stomach, and colon. These data addressed EFSA's concerns for genotoxicity. The Joint WHO/FAO Committee on Food Additives (JECFA) (2016) also reviewed these data and concluded that there is no genotoxicity concern for Tartrazine. Negative findings in parallel genotoxicity studies on Allura Red AC and Ponceau 4R (published separately) are consistent with lack of genotoxicity for azo dyes used as food colors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Exogenous reinfection of tuberculosis in a low-burden area.

    Science.gov (United States)

    Schiroli, Consuelo; Carugati, Manuela; Zanini, Fabio; Bandera, Alessandra; Di Nardo Stuppino, Silvia; Monge, Elisa; Morosi, Manuela; Gori, Andrea; Matteelli, Alberto; Codecasa, Luigi; Franzetti, Fabio

    2015-12-01

    Recurrence of tuberculosis (TB) can be the consequence of relapse or exogenous reinfection. The study aimed to assess the factors associated with exogenous TB reinfection. Prospective cohort study based on the TB database, maintained at the Division of Infectious Diseases, Luigi Sacco Hospital (Milan, Italy). Time period: 1995-2010. (1) ≥2 episodes of culture-confirmed TB; (2) cure of the first episode of TB; (3) availability of one Mycobacterium tuberculosis isolate for each episode. Genotyping of the M. tuberculosis strains to differentiate relapse and exogenous reinfection. Logistic regression analysis was used to assess the influence of risk factors on exogenous reinfections. Of the 4682 patients with TB, 83 were included. Of these, exogenous reinfection was diagnosed in 19 (23 %). It was independently associated with absence of multidrug resistance at the first episode [0, 10 (0.01-0.95), p = 0.045] and with prolonged interval between the first TB episode and its recurrence [7.38 (1.92-28.32) p = 0.004]. However, TB relapses occurred until 4 years after the first episode. The risk associated with being foreign born, extrapulmonary site of TB, and HIV infection was not statistically significant. In the relapse and re-infection cohort, one-third of the patients showed a worsened drug resistance profile during the recurrent TB episode. Exogenous TB reinfections have been documented in low endemic areas, such as Italy. A causal association with HIV infection could not be confirmed. Relapses and exogenous reinfections shared an augmented risk of multidrug resistance development, frequently requiring the use of second-line anti-TB regimens.

  20. Screening potential genotoxic effect of aquatic plant extracts using the mussel micronucleus test

    Directory of Open Access Journals (Sweden)

    Bettina Eck-Varanka

    2016-01-01

    Full Text Available Objective: To assess the genotoxic potential of selected aquatic macrophytes: Ceratophyllum demersum L. (hornwort, family Ceratophyllaceae, Typha angustifolia L. (narrowleaf cattail, family Typhaceae, Stratiotes aloides L. (water soldier, family Butomaceae, and Oenanthe aquatica (L. Poir. (water dropwort, family Umbelliferae. Methods: For genotoxicity assessment, the mussel micronucleus test was applied. Micronucleus frequency was determined from the haemolymph of Unio pictorum L. (painter’s mussel. In parallel, total and hydrolisable tannin contents were determined. Results: All plant extracts elucidated significant mutagenic effect. Significant correlation was determined between tannin content and mutagenic capacity. Conclusions: The significant correlation between genotoxicity as expressed by micronucleus frequency and tannin content (both total and hydrolisable tannins indicate that tannin is amongst the main compounds being responsible for the genotoxic potential. It might be suggested that genotoxic capacity of these plants elucidate a real ecological effect in the ecosystem.

  1. Anti-Genotoxic Potential of Bilirubin In Vivo

    DEFF Research Database (Denmark)

    Wallner, Marlies; Antl, Nadja; Rittmannsberger, Barbara

    2013-01-01

    The bile pigment bilirubin is a known antioxidant and is associated with protection from cancer and cardiovascular disease (CVD) when present in too strong concentrations. Unconjugated bilirubin (UCB) might also possess anti-genotoxic potential by preventing oxidative damage to DNA. Moderately...... elevated bilirubin levels are found in individuals with Gilbert syndrome and more severe in the hyperbilirubinemic Gunn rat model. This study was therefore aimed to assess the levels of oxidative damage to DNA in Gilbert syndrome subjects and Gunn rats compared to matched controls. Seventy-six individuals...

  2. The comet assay in testing the potential genotoxicity of nanomaterials

    Directory of Open Access Journals (Sweden)

    Amaya Azqueta

    2015-06-01

    Full Text Available In the last two decades the production and use of nanomaterials (NMs has impressively increased. Their small size, given a mass equal to that of the corresponding bulk material, implies an increase in the surface area and consequently in the number of atoms that can be reactive. They possess different physical, chemical and biological properties compared to bulk materials of the same composition, which makes them very interesting and valuable for many different applications in technology, energy, construction, electronics, agriculture, optics, paints, textiles, food, cosmetics, medicine... Toxicological assessment of NMs is crucial; the same properties that make them interesting also make them potentially harmful for health and the environment. However, the term NM covers many different kinds of particle , and so there is no simple, standard approach to assessing their toxicity. NMs can enter the cell, interact with cell components and even penetrate the nucleus and interfere with the genetic material. Among the different branches of toxicology, genotoxicity is a main area of concern since it is closely related with the carcinogenic potential of compounds. The Organisation for Economic Co-operation and Development (OECD has published internationally agreed in vitro and in vivo validated test methods to evaluate different genotoxic endpoints of chemicals, including chromosome and gene mutations, and DNA breaks. However not all the assays are suitable to study the genotoxic potential of NMs as has been shown by the OECD Working Party on Manufactured Nanomaterials (WPMN. Moreover, alterations to DNA bases, which are precursors to mutations and of great importance in elucidating the mechanism of action of NMs, are not covered by the OECD guidelines. The in vivo standard comet assay (which measures DNA breaks and alkali-labile sites was included in the OECD assays battery in September 2014 while the in vitro standard comet assay is currently under

  3. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  4. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  5. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  6. Exogenous spatial attention influences figure-ground assignment.

    Science.gov (United States)

    Vecera, Shaun P; Flevaris, Anastasia V; Filapek, Joseph C

    2004-01-01

    In a hierarchical stage account of vision, figure-ground assignment is thought to be completed before the operation of focal spatial attention. Results of previous studies have supported this account by showing that unpredictive, exogenous spatial precues do not influence figure-ground assignment, although voluntary attention can influence figure-ground assignment. However, in these studies, attention was not summoned directly to a region in a figure-ground display. In three experiments, we addressed the relationship between figure-ground assignment and visuospatial attention. In Experiment 1, we replicated the finding that exogenous precues do not influence figure-ground assignment when they direct attention outside of a figure-ground stimulus. In Experiment 2, we demonstrated that exogenous attention can influence figure-ground assignment if it is directed to one of the regions in a figure-ground stimulus. In Experiment 3, we demonstrated that exogenous attention can influence figure-ground assignment in displays that contain a Gestalt figure-ground cue; this result suggests that figure-ground processes are not entirely completed prior to the operation of focal spatial attention. Exogenous spatial attention acts as a cue for figure-ground assignment and can affect the outcome of figure-ground processes.

  7. Exogenous (automatic) attention to emotional stimuli: a review.

    Science.gov (United States)

    Carretié, Luis

    2014-12-01

    Current knowledge on the architecture of exogenous attention (also called automatic, bottom-up, or stimulus-driven attention, among other terms) has been mainly obtained from studies employing neutral, anodyne stimuli. Since, from an evolutionary perspective, exogenous attention can be understood as an adaptive tool for rapidly detecting salient events, reorienting processing resources to them, and enhancing processing mechanisms, emotional events (which are, by definition, salient for the individual) would seem crucial to a comprehensive understanding of this process. This review, focusing on the visual modality, describes 55 experiments in which both emotional and neutral irrelevant distractors are presented at the same time as ongoing task targets. Qualitative and, when possible, meta-analytic descriptions of results are provided. The most conspicuous result is that, as confirmed by behavioral and/or neural indices, emotional distractors capture exogenous attention to a significantly greater extent than do neutral distractors. The modulatory effects of the nature of distractors capturing attention, of the ongoing task characteristics, and of individual differences, previously proposed as mediating factors, are also described. Additionally, studies reviewed here provide temporal and spatial information-partially absent in traditional cognitive models-on the neural basis of preattention/evaluation, reorienting, and sensory amplification, the main subprocesses involved in exogenous attention. A model integrating these different levels of information is proposed. The present review, which reveals that there are several key issues for which experimental data are surprisingly scarce, confirms the relevance of including emotional distractors in studies on exogenous attention.

  8. Exogenous and endogenous spatial attention effects on visuospatial working memory.

    Science.gov (United States)

    Botta, Fabiano; Santangelo, Valerio; Raffone, Antonino; Lupiáñez, Juan; Belardinelli, Marta Olivetti

    2010-08-01

    In this study, we investigate how exogenous and endogenous orienting of spatial attention affect visuospatial working memory (VSWM). Specifically, we focused on two attentional effects and their consequences on storage in VSWM, when exogenous (Experiment 1) or endogenous (Experiment 2) orienting cues were used. The first effect, known as the meridian effect, is given by a decrement in behavioural performance when spatial cues and targets are presented in locations separated by vertical and/or horizontal meridians. The second effect, known as the distance effect, is given by a decrement in the orienting effects as a function of the spatial distance between cues and targets. Our results revealed a dissociation between exogenous and endogenous orienting mechanisms in terms of both meridian and distance effects. We found that meridian crossing affects performance only when endogenous cues were used. Specifically, VSWM performance with endogenous cueing depended more on the number of meridian crossings than on distance between cue and target. By contrast, a U-shaped distance dependency was observed using exogenous cues. Our findings therefore suggest that exogenous and endogenous orienting mechanisms lead to different forms of attentional bias for storage in VSWM.

  9. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  10. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  11. Genotoxicity studies in semiconductor industry. 1. In vitro mutagenicity and genotoxicity studies of waste samples resulting from plasma etching

    Energy Technology Data Exchange (ETDEWEB)

    Braun, R.; Huettner, E.M.; Merten, H.; Raabe, F. (Institute of Plant Genetics and Crop Plant Research, Gatersleben (Germany))

    1993-07-01

    Solid waste samples taken from the etching reactor, the turbo pump, and the waste air system of a plasma etching technology line in semiconductor production were studied as to their genotoxic properties in a bacterial repair test, in the Ames/Salmonella microsome assay, in the SOS chromotest, in primary mouse hepatocytes, and in Chinese hamster V79 cell cultures. All three waste samples were found to be active by inducing of unscheduled DNA-synthesis in mouse hepatocytes in vitro. In the bacterial rec-type repair test with Proteus mirabilis, waste samples taken from the turbo pump and the vacuum pipe system were not genotoxic. The waste sample taken from the chlorine-mediated plasma reactor was clearly positive in the bacterial repair assay and in the SOS chromotest with Escherichia coli. Mutagenic activity was demonstrated for all samples in the presence and absence of S9 mix made from mouse liver homogenate. Again, highest mutagenic activity was recorded for the waste sample taken from the plasma reactor, while samples collected from the turbo pump and from the waste air system before dilution and liberation of the air were less mutagenic. For all samples chromosomal damage in V79 cells was not detected, indicating absence of clastogenic activity in vitro. Altogether, these results indicate generation of genotoxic and mutagenic products as a consequence of chlorine-mediated plasma etching in the microelectronics industry and the presence of genotoxins even in places distant from the plasma reactor. Occupational exposure can be expected both from the precipitated wastes and from chemicals reaching the environment with the air stream.

  12. Neuronal Rat Brain Damage Caused by Endogenous and Exogenous Hyperthermia

    Directory of Open Access Journals (Sweden)

    Mustafa Aydın

    2012-03-01

    Full Text Available OBJECTIVE: Hyperthermia may induce pathologic alterations within body systems and organs including brain. In this study, neuronal effects of endogenous and exogenous hyperthermia (41°C were studied in rats. METHODS: The endogenous hyperthermia (41°C was induced by lipopolysaccharide and the exogenous by an (electric heater. Possible neuronal damage was evaluated by examining healthy, apoptotic and necrotic cells, and heat shock proteins (HSP 27, HSP 70 in the cerebral cortex, cerebellum and hypothalamus RESULTS: At cellular level, when all neuronal tissues are taken into account; (i a significant increase in the necrotic cells was observed in the both groups (p0.05. CONCLUSION: The neural tissue of brain can show different degree of response to hyperthermia. But we can conclude that endogenous hyperthermia is more harmful to central nervous system than exogenous hyperthermia

  13. [Farmer's lung--a form of exogenous allergic alveolitis].

    Science.gov (United States)

    Sambale, M; Liebetrau, G

    1990-11-15

    Exogenic allergic alveolitides are caused by organic dusts which contain bacteria, moulds or vegetable and animal antigens. The farmer's lung as a form of the exogenic allergic alveolitis is a rare disease. The uncharacteristic symptomatology in the initial phase and in particular the retarded beginning of the symptom after several hours handicap the timely recognition in an early phase of the disease so that curative therapeutic measures are rarely possible. The cases of the disease are found only at the chronic stage, at the stage of the pulmonary fibrosis. Then the prognosis is unfavourable. In the Central Clinic for Heart and Lung Diseases Bad Berka 1,110 patients with alveolitides and lung fibroses were diagnosed in the period from 1975 to 1988. 306 of them could be clarified as exogenic allergic alveolitis, 61 of them (19.8%) were farmer's lungs.

  14. Structure and texture of uranium ores in exogenous deposits

    International Nuclear Information System (INIS)

    Danchev, V.I.

    1977-01-01

    Structure and texture signs of uranium rock exogenous deposits have been systematized for the first time, taking into account the slaging of the ore-formation process, connected with formation and change of containing sedimentary rocks, starting with the sedimentogenesis stage and early sediment diagenesis and their subsequent transformation in katagenesis and metamorphism processes. The main features of uranium geochemistry in the exogenous process are considered. Suggested is the genetic classification of uranium exogenous deposits in rocks of sedimentary cover, made with respect to conjugation and various ore-forming productivity of the litogenesis stage. Described are the main combinations of various rock texture and structure properties, characteristic of deposits of genetic classes and groups of the above classification. Eight most frequently occuring textures (lamellar, concretion, oolitic, coagulate, crack, mixed and impregnated) and their types are described and illustrated. Materials of soviet and foreign authors have been used to compile the atlas

  15. Dynamics of tuberculosis transmission with exogenous reinfections and endogenous reactivation

    Science.gov (United States)

    Khajanchi, Subhas; Das, Dhiraj Kumar; Kar, Tapan Kumar

    2018-05-01

    We propose and analyze a mathematical model for tuberculosis (TB) transmission to study the role of exogenous reinfection and endogenous reactivation. The model exhibits two equilibria: a disease free and an endemic equilibria. We observe that the TB model exhibits transcritical bifurcation when basic reproduction number R0 = 1. Our results demonstrate that the disease transmission rate β and exogenous reinfection rate α plays an important role to change the qualitative dynamics of TB. The disease transmission rate β give rises to the possibility of backward bifurcation for R0 < 1, and hence the existence of multiple endemic equilibria one of which is stable and another one is unstable. Our analysis suggests that R0 < 1 may not be sufficient to completely eliminate the disease. We also investigate that our TB transmission model undergoes Hopf-bifurcation with respect to the contact rate β and the exogenous reinfection rate α. We conducted some numerical simulations to support our analytical findings.

  16. In vivo genotoxicity assessment of acrylamide and glycidyl methacrylate.

    Science.gov (United States)

    Dobrovolsky, Vasily N; Pacheco-Martinez, M Monserrat; McDaniel, L Patrice; Pearce, Mason G; Ding, Wei

    2016-01-01

    Acrylamide (ACR) and glycidyl methacrylate (GMA) are structurally related compounds used for making polymers with various properties. Both chemicals can be present in food either as a byproduct of processing or a constituent of packaging. We performed a comprehensive evaluation of ACR and GMA genotoxicity in Fisher 344 rats using repeated gavage administrations. Clastogenicity was measured by scoring micronucleated (MN) erythrocytes from peripheral blood, DNA damage in liver, bone marrow and kidneys was measured using the Comet assay, and gene mutation was measured using the red blood cell (RBC) and reticulocyte Pig-a assay. A limited histopathology evaluation was performed in order to determine levels of cytotoxicity. Doses of up to 20 mg/kg/day of ACR and up to 250 mg/kg/day of GMA were used. ACR treatment resulted in DNA damage in the liver, but not in the bone marrow. While ACR was not a clastogen, it was a weak (equivocal) mutagen in the cells of bone marrow. GMA caused DNA damage in the cells of bone marrow, liver and kidney, and induced MN reticulocytes and Pig-a mutant RBCs in a dose-dependent manner. Collectively, our data suggest that both compounds are in vivo genotoxins, but the genotoxicity of ACR is tissue specific. Published by Elsevier Ltd.

  17. Evaluation of environmental genotoxicity by comet assay in Columba livia.

    Science.gov (United States)

    González-Acevedo, Anahi; García-Salas, Juan A; Gosálvez, Jaime; Fernández, José Luis; Dávila-Rodríguez, Martha I; Cerda-Flores, Ricardo M; Méndez-López, Luis F; Cortés-Gutiérrez, Elva I

    2016-01-01

    The concentrations of recognized or suspected genotoxic and carcinogenic agents found in the air of large cities and, in particular, developing countries, have raised concerns about the potential for chronic health effects in the populations exposed to them. The biomonitoring of environmental genotoxicity requires the selection of representative organisms as "sentinels," as well as the development of suitable and sensitive assays, such as those aimed at assessing DNA damage. The aim of this study was to evaluate DNA damage levels in erythrocytes from Columba livia living in the metropolitan area of Monterrey, Mexico, compared with control animals via comet assay, and to confirm the results via Micronuclei test (MN) and DNA breakage detection-fluorescence in situ hybridization (DBD-FISH). Our results showed a significant increase in DNA migration in animals from the area assayed compared with that observed in control animals sampled in non-contaminated areas. These results were confirmed by MN test and DBD-FISH. In conclusion, these observations confirm that the examination of erythrocytes from Columba livia via alkaline comet assay provides a sensitive and reliable end point for the detection of environmental genotoxicants.

  18. Genotoxicity of corrosion eluates obtained from orthodontic brackets in vitro.

    Science.gov (United States)

    Angelieri, Fernanda; Marcondes, Joao Paulo C; de Almeida, Danielle Cristina; Salvadori, Daisy M F; Ribeiro, Daniel A

    2011-04-01

    The purpose of this study was to evaluate whether corrosion eluates obtained from commercially available orthodontic brackets are able to induce genetic damage in vitro. Genotoxicity was assessed by the single cell gel (comet) assay using Chinese hamster ovary (CHO) cells. The following orthodontic metallic brackets were used: Morelli (Sorocaba, Brazil); Abzil (São José do Rio Preto, Brazil); Dentaurum (Pforzheim, Germany); and 3M Unitek (Puchheim, Germany). Each dental bracket was submitted to a corrosion process in a solution containing equal amounts of acetic acid and sodium chloride at 0.1 M concentration for 1, 3, 7, 14, 21, 35, and 70 days. CHO cells were exposed to eluates for 30 minutes at 37°C. The negative control was treated with the same solution used for corrosion process for 30 minutes at 37°C. Independent positive control was performed with methyl methanesulfonate (MMS) (Sigma Aldrich, St. Louis, Mo) at 1 ug/mL for 1 hour. None of the eluates was found to exhibit genotoxicity, regardless of the different commercial brands of orthodontic appliance used. In summary, our results indicate corrosion eluates obtained from orthodontic brackets do not induce genetic damage as assessed by single cell gel (comet) assay. Copyright © 2011 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  19. Histopathological and genotoxic effects of chlorpyrifos in rats.

    Science.gov (United States)

    Ezzi, Lobna; Belhadj Salah, Imen; Haouas, Zohra; Sakly, Amina; Grissa, Intissar; Chakroun, Sana; Kerkeni, Emna; Hassine, Mohsen; Mehdi, Meriem; Ben Cheikh, Hassen

    2016-03-01

    This study aims to investigate the effects of chlorpyrifos's sub-acute exposure on male rats. Two groups with six animals each were orally treated, respectively, with 3.1 mg/kg b w and 6.2 mg/kg b w of chlorpyrifos during 4 weeks. The genotoxic effect of chlopyrifos was investigated using the comet assay and the micronucleus test. Some hematological and liver's histopathological changes were also evaluated. Results revealed that chlorpyrifos induced histopathological alterations in liver parenchyma. The lymphoid infiltration observed in liver sections and the increase in white blood cells parameter are signs of inflammation. A significant increase in the platelet' count and in polychromatic erythrocytes/normochromatic erythrocytes (PCE/NCE) ratio was observed in chlorpyrifos-treated groups which could be due to the stimulatory effect of chlorpyrifos on cell formation in the bone marrow at lower doses. In addition, the increase of bone marrow micronucleus percentage and the comet tail length revealed a genotoxic potential of chlorpyrifos in vivo.

  20. Genotoxicity of formaldehyde: Molecular basis of DNA damage and mutation

    Directory of Open Access Journals (Sweden)

    Masanobu eKawanishi

    2014-09-01

    Full Text Available Formaldehyde is commonly used in the chemical industry and is present in the environment, such as vehicle emissions, some building materials, food and tobacco smoke. It also occurs as a natural product in most organisms, the sources of which include a number of metabolic processes. It causes various acute and chronic adverse effects in humans if they inhale its fumes. Among the chronic effects on human health, we summarize data on genotoxicity and carcinogenicity in this review, and we particularly focus on the molecular mechanisms involved in the formaldehyde mutagenesis. Formaldehyde mainly induces N-hydroxymethyl mono-adducts on guanine, adenine and cytosine, and N-methylene crosslinks between adjacent purines in DNA. These crosslinks are types of DNA damage potentially fatal for cell survival if they are not removed by the nucleotide excision repair pathway. In the previous studies, we showed evidence that formaldehyde causes intra-strand crosslinks between purines in DNA using a unique method (Matsuda et al. Nucleic Acids Res. 26, 1769-1774,1998. Using shuttle vector plasmids, we also showed that formaldehyde as well as acetaldehyde induces tandem base substitutions, mainly at 5’-GG and 5’-GA sequences, which would arise from the intra-strand crosslinks. These mutation features are different from those of other aldehydes such as crotonaldehyde, acrolein, glyoxal and methylglyoxal. These findings provide molecular clues to improve our understanding of the genotoxicity and carcinogenicity of formaldehyde.

  1. The genotoxic effect of oxcarbazepine on mice blood lymphocytes.

    Science.gov (United States)

    Akbar, Huma; Khan, Ajmal; Mohammadzai, Imdadullah; Khisroon, Muhammad; Begum, Ilham

    2018-04-01

    This study was conducted to assess the amount of DNA damage caused by Oxcarbazepine (OXC) through single cell gel electrophoresis (SCGE) technique/comet assay. OXC derived from dibenzazepine series is an effective second generation antiepileptic drug (AED) for both children and adults. Side effects like genotoxic effects of AEDs are of prime importance resulting from toxic metabolites, free radicals and reactive oxygen species (ROS). Forty Eight adult male Bagg's albino mice (BALB/c) were randomly classified into eight groups, each comprising of six animals. Two of these groups were control and six were tested groups. Control groups were injected with 1% tween 80 while tested groups were injected with 10, 20, and 40 mg/kg-day OXC for seven days (acute therapy) and 28 days (subchronic therapy) in peritoneal cavity. Blood samples were collected by cardiac puncture and subjected to comet assay for the analysis of DNA damage. Per sample 100 cells were scored and classified according to comet tail length. The results showed that OXC in acute and long term therapies had significantly higher (p < 0.05) genotoxicity in treated groups as compared to control groups. Our study suggests that OXC may cause significant DNA damage in both acute as well as in subchronic therapies.

  2. Hexavalent chromium is cytotoxic and genotoxic to American alligator cells.

    Science.gov (United States)

    Wise, Sandra S; Wise, Catherine; Xie, Hong; Guillette, Louis J; Zhu, Cairong; Wise, John Pierce; Wise, John Pierce

    2016-02-01

    Metals are a common pollutant in the aquatic ecosystem. With global climate change, these levels are anticipated to rise as lower pH levels allow sediment bound metals to be released. The American alligator (Alligator mississippiensis) is an apex predator in the aquatic ecosystem and is considered a keystone species; as such it serves as a suitable monitor for localized pollution. One metal of increasing concern is hexavalent chromium (Cr(VI)). It is present in the aquatic environment and is a known human carcinogen and reproductive toxicant. We measured the cytotoxicity and genotoxicity of Cr(VI) in American alligator cells derived from scute tissue. We found that particulate and soluble Cr(VI) are both cytotoxic and genotoxic to alligator cells in a concentration-dependent manner. These data suggest that alligators may be used as a model for assessing the effects of environmental Cr(VI) contamination as well as for other metals of concern. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Genotoxic effects of bismuth (III oxide nanoparticles by comet assay

    Directory of Open Access Journals (Sweden)

    Reecep Liman

    2015-06-01

    Full Text Available Bismuth oxide is one of the important transition metal oxides and it has been intensively studied due to their peculiar characteristics (semiconductor band gap, high refractive index, high dielectric permittivity, high oxygen conductivity, resistivity, photoconductivity and photoluminescence etc.. Therefore, it is used such as microelectronics, sensor technology, optical coatings, transparent ceramic glass manufacturing, nanoenergetic gas generator, biosensor for DNA hybridization, potential immobilizing platforms for glucose oxidase and polyphenol oxidase, fuel cells, a additive in paints, an astringent in a variety of medical creams and topical ointments, and for the determination of heavy metal ions in drinking water, mineral water and urine. In addition this, Bismuth (III oxide nanoparticles (BONPs are favorable for the biomolecules adsorption than regular sized particles because of their greater advantages and novel characteristics (much higher specific surface, greater surface free energy, and good electrochemical stability etc.. Genotoxic effects of BONPs were investigated on the root cells of Allium cepa by Comet assay. A. cepa roots were treated with the aqueous dispersions of BONPs at 5 different concentrations (12.5, 25, 50, 75, and 100 ppm for 4 h. A significant increase in DNA damage was also observed at all concentrations of BONPs except 12.5 ppm by Comet assay. The results were also analyzed statistically by using SPSS for Windows; Duncan’s multiple range test was performed. These result indicate that BONPs exhibit genotoxic activity in A. cepa root meristematic cells.

  4. Nanoceria have no genotoxic effect on human lens epithelial cells

    Energy Technology Data Exchange (ETDEWEB)

    Pierscionek, Barbara K; Yasseen, Akeel A [School of Biomedical Sciences, University of Ulster, Coleraine, BT52 1SA (United Kingdom); Li, Yuebin; Schachar, Ronald A; Chen, Wei [Department of Physics, University of Texas at Arlington, Arlington, TX 76019 (United States); Colhoun, Liza M, E-mail: b.pierscionek@ulster.ac.uk, E-mail: weichen@uta.edu [Centre for Vision and Vascular Sciences, School of Medicine, Dentistry and Biomedical Sciences, Queen' s University Belfast, Grosvenor Road, Belfast, BT12 6BA (United Kingdom)

    2010-01-22

    There are no treatments for reversing or halting cataract, a disease of the structural proteins in the eye lens, that has associations with other age-related degenerative conditions such as Alzheimer's disease. The incidence of cataract and associated conditions is increasing as the average age of the population rises. Protein folding diseases are difficult to assess in vivo as proteins and their age-related changes are assessed after extraction. Nanotechnology can be used to investigate protein changes in the intact lens as well as for a potential means of drug delivery. Nanoparticles, such as cerium oxide (CeO{sub 2}) which have antioxidant properties, may even be used as a means of treating cataract directly. Prior to use in treatments, nanoparticle genotoxicity must be tested to assess the extent of any DNA or chromosomal damage. Sister chromatid exchanges were measured and DNA damage investigated using the alkaline COMET assay on cultured human lens epithelial cells, exposed to 5 and 10 {mu}g ml{sup -1} of CeO{sub 2} nanoparticles (nanoceria). Nanoceria at these dosages did not cause any DNA damage or significant increases in the number of sister chromatid exchanges. The absence of genotoxic effects on lens cells suggests that nanoceria, in the doses and exposures tested in this study, are not deleterious to the eye lens and have the potential for use in studying structural alterations, in developing non-surgical cataract treatments and in investigating other protein folding diseases.

  5. Genotoxic action of sunlight upon Bacillus subtilis spores

    International Nuclear Information System (INIS)

    Munakata, Nobuo

    1989-01-01

    Samples of Bacillus subtilis spores dried on membrane filter were exposed to natural sunlight from solar-noon time at Tokyo. The survival and mutation induction of wild-type (UVR) and repair-deficient (UVS) spores were determined on 66 occasions since 1979. Two of the values were considered to be useful in monitoring solar UV intensity; the inverse of the time (in minutes) of exposure to kill 63% of the UVS spores ('sporocidal index') and the induced mutation frequency at 60 minutes of exposure of the UVR spores ('mutagenic index'). Both values were varied greatly due to time of a year, weather and other conditions. Estimates of year-round changes under clear skies were obtained by connecting the maximum values attained in these years. In these curves, there are more than 7-fold differences in the genotoxicity between winter and summer months, with major increases observed in early spring and decreases through autumn. Using a series of UV cut-off filters, the wavelengths most effective for the sporocidal actions were estimated to be in the range of 308 - 325 nm, shorter wavelengths being effective when the genotoxicity was higher. Sunburn meter of Robertson-Berger type seems to respond to slightly longer wavelength components of the solar spectrum. However, a reasonable correlation was obtained between the reading of the meter and the sporocidal index. (author)

  6. Genotoxicity evaluation of HMG CoA reductase inhibitor rosuvastatin.

    Science.gov (United States)

    Berber, Ahmet Ali; Celik, Mustafa; Aksoy, Hüseyin

    2014-07-01

    The genotoxic potential of rosuvastatin as one of the statin drugs was assessed by chromosomal aberrations (CAs), micronucleus (MN) and DNA damage by comet assay in the human peripheral blood lymphocytes. Rosuvastatin was used at concentrations of 0.0625, 0.125, 0.25, 0.5 and 1 µg/mL for these in vitro assays. In all assays, a negative and positive control were also included. CA frequencies were significantly increased in all concentrations at 24 hours and significantly increased in all concentrations except 0.0625 µg/mL at 48 hours, compared to the negative control. Rosuvastatin has a decreased mitotic index (MI) at 0.5- and 1-µg/mL concentrations at 24 hours and at 0.25, 0.5 and 1 µg/mL at 48 hours. A significant increase was observed for induction of MN in all treatments, compared to the negative control. Cytokinesis-block proliferation indices were not affected by treatments with rosuvastatin. In the comet assay, significant increases in comet tail length and tail moment were observed at 0.0625-, 0.5- and 1-µg/mL concentrations. Comet intensity was significantly increased in all concentrations except 0.0625 µg/mL. According to these results, rosuvastatin is cytotoxic and clastogenic/aneugenic in human peripheral lymphocytes. Further studies should be conducted in other test systems to evaluate the full genotoxic potential of rosuvastatin.

  7. Comparative Genotoxicity of Cadmium and Lead in Earthworm Coelomocytes

    Directory of Open Access Journals (Sweden)

    Ptumporn Muangphra

    2011-01-01

    Full Text Available To determine genotoxicity to coelomocytes, Pheretima peguana earthworms were exposed in filter paper studies to cadmium (Cd and lead (Pb for 48 h, at concentrations less than the LC10—Cd: 0.09, 0.19, 0.38, 0.75, and 1.50 μg cm−2; Pb: 1.65, 3.29, 6.58, 13.16, and 26.32 μg cm−2. For Cd at 0.75 μg cm−2, in the micronucleus test (detects chromosomal aberrations, significant increases (<.05 in micronuclei and binucleate cells were observed, and in the comet assay (detects DNA single-strand breaks, tail DNA% was significantly increased. Lead was less toxic with minimal effects on DNA, but the binucleates were significantly increased by Pb at 3.29 μg cm−2. This study shows that Cd is more acutely toxic and sublethally genotoxic than Pb to P. peguana. Cadmium caused chromosomal aberrations and DNA single-strand breaks at 45% of the LC10 concentration. Lead, in contrast, did not induce DNA damage but caused cytokinesis defects.

  8. Genotoxicity of Nicotiana tabacum leaves on Helix aspersa.

    Science.gov (United States)

    da Silva, Fernanda R; Erdtmann, Bernardo; Dalpiaz, Tiago; Nunes, Emilene; Ferraz, Alexandre; Martins, Tales L C; Dias, Johny F; da Rosa, Darlan P; Porawskie, Marilene; Bona, Silvia; da Silva, Juliana

    2013-07-01

    Tobacco farmers are routinely exposed to complex mixtures of inorganic and organic chemicals present in tobacco leaves. In this study, we examined the genotoxicity of tobacco leaves in the snail Helix aspersa as a measure of the risk to human health. DNA damage was evaluated using the micronucleus test and the Comet assay and the concentration of cytochrome P450 enzymes was estimated. Two groups of snails were studied: one fed on tobacco leaves and one fed on lettuce (Lactuca sativa L) leaves (control group). All of the snails received leaves (tobacco and lettuce leaves were the only food provided) and water ad libitum. Hemolymph cells were collected after 0, 24, 48 and 72 h. The Comet assay and micronucleus test showed that exposure to tobacco leaves for different periods of time caused significant DNA damage. Inhibition of cytochrome P450 enzymes occurred only in the tobacco group. Chemical analysis indicated the presence of the alkaloid nicotine, coumarins, saponins, flavonoids and various metals. These results show that tobacco leaves are genotoxic in H. aspersa and inhibit cytochrome P450 activity, probably through the action of the complex chemical mixture present in the plant.

  9. Genotoxicity of Nicotiana tabacum leaves on Helix aspersa

    Directory of Open Access Journals (Sweden)

    Fernanda R. da Silva

    2013-01-01

    Full Text Available Tobacco farmers are routinely exposed to complex mixtures of inorganic and organic chemicals present in tobacco leaves. In this study, we examined the genotoxicity of tobacco leaves in the snail Helix aspersa as a measure of the risk to human health. DNA damage was evaluated using the micronucleus test and the Comet assay and the concentration of cytochrome P450 enzymes was estimated. Two groups of snails were studied: one fed on tobacco leaves and one fed on lettuce (Lactuca sativa L leaves (control group. All of the snails received leaves (tobacco and lettuce leaves were the only food provided and water ad libitum. Hemolymph cells were collected after 0, 24, 48 and 72 h. The Comet assay and micronucleus test showed that exposure to tobacco leaves for different periods of time caused significant DNA damage. Inhibition of cytochrome P450 enzymes occurred only in the tobacco group. Chemical analysis indicated the presence of the alkaloid nicotine, coumarins, saponins, flavonoids and various metals. These results show that tobacco leaves are genotoxic in H. aspersa and inhibit cytochrome P450 activity, probably through the action of the complex chemical mixture present in the plant.

  10. Biomonitoring of genotoxic exposure among stainless steel welders

    DEFF Research Database (Denmark)

    Knudsen, Lisbeth E.; Boisen, T; Christensen, J M

    1992-01-01

    A biosurvey in the Danish metal industry measured the genotoxic exposure from stainless steel welding. The study comprised measurements of chromosomal aberrations (CA), sister-chromatid exchanges (SCE), unscheduled DNA synthesis (UDS) in peripheral lymphocytes and serum immunoglobulin G. Environm......A biosurvey in the Danish metal industry measured the genotoxic exposure from stainless steel welding. The study comprised measurements of chromosomal aberrations (CA), sister-chromatid exchanges (SCE), unscheduled DNA synthesis (UDS) in peripheral lymphocytes and serum immunoglobulin G....... A higher frequency of chromosomal aberrations, classified as translocations, double minutes, exchanges and rings, was observed in stainless steel welders than in non-welders. SCE was lower in welders working with both MMA and TIG welding than in reference persons. N-Acetoxy-N-acetylaminofluorene (NA...... lymphocytes in exposed persons compared with non-exposed are suggested. MMA welding gave the highest exposure to chromium, an increased number of chromosomal aberrations and a decrease in SCE when compared with TIG welding. Consequently improvements in the occupational practice of stainless steel welding...

  11. Cytotoxicity and genotoxicity property of hydroxyapatite-mullite eluates.

    Science.gov (United States)

    Kalmodia, Sushma; Sharma, Vyom; Pandey, Alok K; Dhawan, Alok; Basu, Bikramjit

    2011-02-01

    Long-term biomedical applications of implant materials may cause osteolysis, aseptic losing and toxicity. Therefore, we investigated the cytotoxic and genotoxic potential of hydroxyapatite (HA) mullite eluates in L929 mouse fibroblast cells. The spark plasma sintered HA-20% mullite biocomposite (HA20M) were ground using mortar and pestle as well as ball milling. The cells were exposed for 6 h to varying concentrations (10, 25, 50, 75 and 100%) of the eluates of HA-20% mullite (87 nm), HA (171 nm) and mullite (154 nm). The scanning electron microscopy and MTT assay revealed the concentration dependent toxicity of H20M eluate at and above 50%. The analysis of the DNA damaging potential of HA, mullite and HA20M eluates using Comet assay demonstrated a significant DNA damage by HA20M which was largely related to the presence of mullite. The results collectively demonstrate the cytotoxic and genotoxic potential of HA20M eluate in L929 cells is dependent on particle size, concentration and composition.

  12. Antioxidant, genotoxic and antigenotoxic activities of daphne gnidium leaf extracts

    Directory of Open Access Journals (Sweden)

    Chaabane Fadwa

    2012-09-01

    Full Text Available Abstract Background Plants play a significant role in maintaining human health and improving the quality of human life. They serve humans well as valuable components of food, as well as in cosmetics, dyes, and medicines. In fact, many plant extracts prepared from plants have been shown to exert biological activity in vitro and in vivo. The present study explored antioxidant and antigenotoxic effects of Daphne gnidium leaf extracts. Methods The genotoxic potential of petroleum ether, chloroform, ethyl acetate, methanol and total oligomer flavonoid (TOF enriched extracts from leaves of Daphne gnidium, was assessed using Escherichia coli PQ37. Likewise, the antigenotoxicity of the same extracts was tested using the “SOS chromotest test”. Antioxidant activities were studied using non enzymatic and enzymatic method: NBT/Riboflavine and xantine oxidase. Results None of the different extracts produced a genotoxic effect, except TOF extract at the lowest tested dose. Our results showed that D. gnidium leaf extracts possess an antigenotoxic effect against the nitrofurantoin a mutagen of reference. Ethyl acetate and TOF extracts were the most effective in inhibiting xanthine oxidase activity. While, methanol extract was the most potent superoxide scavenger when tested with the NBT/Riboflavine assay. Conclusions The present study has demonstrated that D. gnidium leaf extract possess antioxidant and antigenotoxic effects. These activities could be ascribed to compounds like polyphenols and flavonoid. Further studies are required to isolate the active molecules.

  13. A review of the genotoxicity of trimethylolpropane triacrylate (TMPTA).

    Science.gov (United States)

    Kirkland, David; Fowler, Paul

    2018-04-01

    Trimethylolpropane triacrylate (TMPTA) is a trifunctional acrylate monomer which polymerizes rapidly when exposed to sources of free radicals. It is widely used as a reactive diluent and polymer building block in the formulation of overprint varnishes, inks and a variety of wood, plastic and metal coatings. TMPTA has been tested in a range of in vitro and in vivo genotoxicity tests. There is no clear evidence of induction of gene mutations by TMPTA in bacteria or mammalian cells in vitro, but there is evidence of clastogenicity from induction of small colony tk mutants in the mouse lymphoma assay, and also induction of micronuclei and chromosomal aberrations. However, TMPTA was negative in bone marrow or blood micronucleus tests in vivo following oral or repeated dermal application, and did not induce comets in bone marrow or liver of mice following intravenous administration, which would have achieved plasma (and therefore tissue) concentrations estimated to exceed those inducing clastogenic effects in vitro. It is concluded that TMPTA is not genotoxic in vivo. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  14. Fructose and Sucrose Intake Increase Exogenous Carbohydrate Oxidation during Exercise

    Science.gov (United States)

    Trommelen, Jorn; Fuchs, Cas J.; Beelen, Milou; Lenaerts, Kaatje; Jeukendrup, Asker E.; Cermak, Naomi M.; van Loon, Luc J. C.

    2017-01-01

    Peak exogenous carbohydrate oxidation rates typically reach ~1 g·min−1 during exercise when ample glucose or glucose polymers are ingested. Fructose co-ingestion has been shown to further increase exogenous carbohydrate oxidation rates. The purpose of this study was to assess the impact of fructose co-ingestion provided either as a monosaccharide or as part of the disaccharide sucrose on exogenous carbohydrate oxidation rates during prolonged exercise in trained cyclists. Ten trained male cyclists (VO2peak: 65 ± 2 mL·kg−1·min−1) cycled on four different occasions for 180 min at 50% Wmax during which they consumed a carbohydrate solution providing 1.8 g·min−1 of glucose (GLU), 1.2 g·min−1 glucose + 0.6 g·min−1 fructose (GLU + FRU), 0.6 g·min−1 glucose + 1.2 g·min−1 sucrose (GLU + SUC), or water (WAT). Peak exogenous carbohydrate oxidation rates did not differ between GLU + FRU and GLU + SUC (1.40 ± 0.06 vs. 1.29 ± 0.07 g·min−1, respectively, p = 0.999), but were 46% ± 8% higher when compared to GLU (0.96 ± 0.06 g·min−1: p exogenous carbohydrate oxidation rates during the latter 120 min of exercise were 46% ± 8% higher in GLU + FRU or GLU + SUC compared with GLU (1.19 ± 0.12, 1.13 ± 0.21, and 0.82 ± 0.16 g·min−1, respectively, p exogenous carbohydrate oxidation rates during prolonged exercise in trained cyclists. PMID:28230742

  15. VEGF-A is increased in exogenous endophthalmitis.

    Science.gov (United States)

    Seamone, Mark E; Lewis, Darrell R; Haidl, Ian D; Gupta, R Rishi; O' Brien, Daniel M; Dickinson, John; Samad, Arif; Marshall, Jean S; Cruess, Alan F

    2017-06-01

    Exogenous endophthalmitis is an ophthalmologic emergency defined by panocular inflammation. Vascular endothelial growth factor A (VEGF-A) contributes to inflammation by promoting chemotaxis of monocytes and granulocytes and by increasing vascular permeability. The purpose of this article is to determine if VEGF-A is elevated in the vitreous samples obtained from individuals with exogenous endophthalmitis. Vitreous samples from individuals with exogenous endophthalmitis (n = 18) were analyzed via Luminex assay and enzyme-linked immunosorbent assay for the cytokines VEGF-A, tumor necrosis factor (TNF), interleukin 6 (IL-6), IL-8 (chemokine [CXCL]-8), IL-1β, IL-10, IL-12p70, IL-33, interferon (IFN)-γ, IFN-α, IFN-β, chemokine ligand (CCL)-3, IL-2, IL-5, IL-15, CXCL-10, CCL-2, IL-1Ra, CCL-5, IL-17, and CCL-11. Vitreous samples obtained at the time of macular hole surgery served as controls (n = 8). Concentrations of VEGF-A were significantly elevated in vitreous samples from individuals with exogenous endophthalmitis compared with macular hole (p exogenous endophthalmitis after cataract surgery (p = 0.001), vitrectomy (p = 0.024), and intravitreal injection (p = 0.012). VEGF-A concentrations were similar in both culture-positive and culture-negative populations (p > 0.05). In a linear regression model, levels of VEGF-A correlated significantly with the chemokine CXCL-8 (p = 0.028). We demonstrate that VEGF-A is potently upregulated in exogenous endophthalmitis. This observation provides a foundation for future studies of targeted VEGF-A blockade in the management of endophthalmitis. Crown Copyright © 2017. Published by Elsevier Inc. All rights reserved.

  16. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  17. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  18. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  19. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  20. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  1. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  2. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  3. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  4. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  5. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  7. Neuropsychiatric findings in Cushing syndrome and exogenous glucocorticoid administration.

    Science.gov (United States)

    Starkman, Monica N

    2013-09-01

    This article reviews the neuropsychiatric presentations elicited by spontaneous hypercortisolism and exogenous supraphysiologic glucocorticoids. Patients with Cushing disease and syndrome develop a depressive syndrome: irritable and depressed mood, decreased libido, disrupted sleep and cognitive decrements. Exogenous short-term glucocorticoid administration may elicit a hypomanic syndrome with mood, sleep and cognitive disruptions. Treatment options are discussed. Brain imaging and neuropsychological studies indicate elevated cortisol and other glucocorticoids are especially deleterious to hippocampus and frontal lobe. The research findings also shed light on neuropsychiatric abnormalities in conditions that have substantial subgroups exhibiting elevated and dysregulated cortisol: aging, major depressive disorder and Alzheimer's disease. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  9. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  10. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  11. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  12. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  13. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  16. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  17. Soil genotoxicity assessment: a new stategy based on biomolecular tools and plant bioindicators.

    Science.gov (United States)

    Citterio, Sandra; Aina, Roberta; Labra, Massimo; Ghiani, Alessandra; Fumagalli, Pietro; Sgorbati, Sergio; Santagostino, Angela

    2002-06-15

    The setting up of efficient early warning systems is a challenge to research for preventing environmental alteration and human disease. In this paper, we report the development and the field application of a new biomonitoring methodology for assessing soil genotoxicity. In the first part, the use of amplified fragment length polymorphism and flow cytometry techniques to detect DNA damage induced by soils artificially contaminated with heavy metals as potentially genotoxic compounds is explained. Results show that the combination of the two techniques leads to efficient detection of the sublethal genotoxic effect induced in the plant bioindicator by contaminated soil. By contrast, the classic mortality, root, and shoot growth vegetative endpoints prove inappropriate for assessing soil genotoxicity because, although they cause genotoxic damage, some heavy metals do not affect sentinel plant development negatively. The statistical elaboration of the data obtained led to the development of a statistical predictive model which differentiates four different levels of soil genotoxic pollution and can be used everywhere. The second part deals with the application of the biomonitoring protocol in the genotoxic assessment of two areas surrounding a steelworks in northern Italy and the effectiveness of this methodology. In this particular case, in these areas, the predictive model reveals a pollution level strictly correlated to the heavy metal concentrations revealed by traditional chemical analysis.

  18. New investigations into the genotoxicity of cobalt compounds and their impact on overall assessment of genotoxic risk.

    Science.gov (United States)

    Kirkland, David; Brock, Tom; Haddouk, Hasnaà; Hargeaves, Victoria; Lloyd, Melvyn; Mc Garry, Sarah; Proudlock, Raymond; Sarlang, Séverine; Sewald, Katherina; Sire, Guillaume; Sokolowski, Andrea; Ziemann, Christina

    2015-10-01

    The genotoxicity of cobalt metal and cobalt compounds has been widely studied. Several publications show induction of chromosomal aberrations, micronuclei or DNA damage in mammalian cells in vitro in the absence of S9. Mixed results were seen in gene mutation studies in bacteria and mammalian cells in vitro, and in chromosomal aberration or micronucleus assays in vivo. To resolve these inconsistencies, new studies were performed with soluble and poorly soluble cobalt compounds according to OECD-recommended protocols. Induction of chromosomal damage was confirmed in vitro, but data suggest this may be due to oxidative stress. No biologically significant mutagenic responses were obtained in bacteria, Tk(+/-) or Hprt mutation tests. Negative results were also obtained for chromosomal aberrations (in bone marrow and spermatogonia) and micronuclei at maximum tolerated doses in vivo. Poorly soluble cobalt compounds do not appear to be genotoxic. Soluble compounds do induce some DNA and chromosomal damage in vitro, probably due to reactive oxygen. The absence of chromosome damage in robust GLP studies in vivo suggests that effective protective processes are sufficient to prevent oxidative DNA damage in whole mammals. Overall, there is no evidence of genetic toxicity with relevance for humans of cobalt substances and cobalt metal. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  19. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  20. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  1. Exogenous insulin antibody syndrome (EIAS): a clinical syndrome associated with insulin antibodies induced by exogenous insulin in diabetic patients.

    Science.gov (United States)

    Hu, Xiaolei; Chen, Fengling

    2018-01-01

    Insulin has been used for diabetes therapy and has achieved significant therapeutic effect. In recent years, the use of purified and recombinant human insulin preparations has markedly reduced, but not completely suppressed, the incidence of insulin antibodies (IAs). IAs induced by exogenous insulin in diabetic patients is associated with clinical events, which is named exogenous insulin antibody syndrome (EIAS). The present review is based on our research and summarizes the characterization of IAs, the factors affecting IA development, the clinical significance of IAs and the treatments for EIAS. © 2018 The authors.

  2. Methodological considerations for using umu assay to assess photo-genotoxicity of engineered nanoparticles

    DEFF Research Database (Denmark)

    Cupi, Denisa; Baun, Anders

    2016-01-01

    In this study we investigated the feasibility of high-throughput (96-well plate) umu assay to test the genotoxic effect of TiO2 engineered nanoparticles (ENPs) under UV light (full spectrum) and visible light (455nm). Exposure of TiO2 ENPs to up to 60min of UV light induced a photocatalytic...... production of ROS. However, UV light itself caused cytotoxic damage to Salmonella typhimurium at exposures >15min and a genotoxic effect at exposures >0.5min; and use of UV filters did not lower this effect. No genotoxicity of TiO2 ENPs was observed under visible light conditions at concentrations up to 100...

  3. Evaluation of the tickcide, genotoxic, and mutagenic effects of the Ruta graveolens L. (Rutaceae

    Directory of Open Access Journals (Sweden)

    Alessandra Vargas de Carvalho

    2015-10-01

    Full Text Available Current analysis investigated the tickcide effects of the aqueous extract and chloroform fractions of Ruta graveolens L. (rue on engorged females of Rhipicephalus microplus, as well as their genotoxic and mutagenic effects on human leukocytes. The best tickcide activity (non-dependent dose and genotoxic / mutagenic effects (dependent-dose were observed on exposure to chloroform fractions. Results suggest that extract fractions of R. graveolens L are efficient against R. microplus, although the fraction and the tested concentrations show genotoxic and mutagenic potential for human leukocytes.

  4. Acute Toxicity and Genotoxic Activity of Avocado Seed Extract (Persea americana Mill., c.v. Hass

    Directory of Open Access Journals (Sweden)

    Eduardo Padilla-Camberos

    2013-01-01

    Full Text Available The use of vegetal extracts requires toxicological and genotoxic evaluations to establish and verify safety before being added to human cosmetic, pharmaceutical medicine, or alimentary products. Persea americana seeds have been used in traditional medicine as treatment for several diseases. In this work, the ethanolic seed extract of Persea americana was evaluated with respect to its genotoxic potential through micronucleus assay in rodents. The frequency of micronuclei in groups of animals treated with avocado seed extract showed no differences compared to the negative control (vehicle; therefore, it is considered that the avocado seed extract showed no genotoxic activity in the micronucleus test.

  5. Acute toxicity and genotoxic activity of avocado seed extract (Persea americana Mill., c.v. Hass).

    Science.gov (United States)

    Padilla-Camberos, Eduardo; Martínez-Velázquez, Moisés; Flores-Fernández, José Miguel; Villanueva-Rodríguez, Socorro

    2013-01-01

    The use of vegetal extracts requires toxicological and genotoxic evaluations to establish and verify safety before being added to human cosmetic, pharmaceutical medicine, or alimentary products. Persea americana seeds have been used in traditional medicine as treatment for several diseases. In this work, the ethanolic seed extract of Persea americana was evaluated with respect to its genotoxic potential through micronucleus assay in rodents. The frequency of micronuclei in groups of animals treated with avocado seed extract showed no differences compared to the negative control (vehicle); therefore, it is considered that the avocado seed extract showed no genotoxic activity in the micronucleus test.

  6. Endogenous versus exogenous generic reference pricing for pharmaceuticals.

    Science.gov (United States)

    Antoñanzas, F; Juárez-Castelló, C A; Rodríguez-Ibeas, R

    2017-12-01

    In this paper we carry out a vertical differentiation duopoly model applied to pharmaceutical markets to analyze how endogenous and exogenous generic reference pricing influence competition between generic and branded drugs producers. Unlike the literature, we characterize for the exogenous case the equilibrium prices for all feasible relevant reference prices. Competition is enhanced after the introduction of a reference pricing system. We also compare both reference pricing systems on welfare grounds, assuming two different objective functions for health authorities: (i) standard social welfare and (ii) gross consumer surplus net of total pharmaceutical expenditures. We show that regardless of the objective function, health authorities will never choose endogenous reference pricing. When health authorities are paternalistic, the exogenous reference price that maximizes standard social welfare is such that the price of the generic drug is the reference price while the price of the branded drug is higher than the reference price. When health authorities are not paternalistic, the optimal exogenous reference price is such that the price of the branded drug is the reference price while the price of the generic drug is lower than the reference price.

  7. Effects of whey, molasses and exogenous enzymes on the ensiling ...

    African Journals Online (AJOL)

    The study was conducted to assess the effects of whey, molasses and exogenous enzymes on fermentation, aerobic stability and nutrient composition of ensiled maize cobs. Five treatments were ensiled in 1.5 L anaerobic glass jars over 32 days, namely i) control (maize cobs without additives (CON); ii) maize cobs with ...

  8. Endogenous versus Exogenous Growth Factor Regulation of Articular Chondrocytes

    Science.gov (United States)

    Shi, Shuiliang; Chan, Albert G.; Mercer, Scott; Eckert, George J.; Trippel, Stephen B.

    2014-01-01

    Anabolic growth factors that regulate the function of articular chondrocytes are candidates for articular cartilage repair. Such factors may be delivered by pharmacotherapy in the form of exogenous proteins, or by gene therapy as endogenous proteins. It is unknown whether delivery method influences growth factor effectiveness in regulating articular chondrocyte reparative functions. We treated adult bovine articular chondrocytes with exogenous recombinant insulin-like growth factor-I (IGF-I) and transforming growth factor-beta1 (TGF-β1), or with the genes encoding these growth factors for endogenous production. Treatment effects were measured as change in chondrocyte DNA content, glycosaminoglycan production, and aggrecan gene expression. We found that IGF-I stimulated chondrocyte biosynthesis similarly when delivered by either exogenous or endogenous means. In contrast, exogenous TGF-ß1 stimulated these reparative functions, while endogenous TGF-ß1 had little effect. Endogenous TGF-ß1 became more bioactive following activation of the transgene protein product. These data indicate that effective mechanisms of growth factor delivery for articular cartilage repair may differ for different growth factors. In the case of IGF-I, gene therapy or protein therapy appear to be viable options. In contrast, TGF-ß1 gene therapy may be constrained by a limited ability of chondrocytes to convert latent complexes to an active form. PMID:24105960

  9. Cassava Leaf Meal and Exogenous Enzyme as Supplements in ...

    African Journals Online (AJOL)

    %, 50% and 66.67% such that the levels of cassava leaf meal (CLM) supplementation were 5%, 7.5% and 10% but in addition Avizyme® (an exogenous commercial polysaccharidase) was added to the diets at the rate of 100g kg-1. The birds ...

  10. Accounting for Exogenous Influences in Performance Evaluations of Teachers

    Science.gov (United States)

    De Witte, Kristof; Rogge, Nicky

    2011-01-01

    Students' evaluations of teacher performance (SETs) are increasingly used by universities. However, SETs are controversial mainly due to two issues: (1) teachers value various aspects of excellent teaching differently, and (2) SETs should not be determined on exogenous influences. Therefore, this paper constructs SETs using a tailored version of…

  11. Do Endogenous and Exogenous Action Control Compete for Perception?

    Science.gov (United States)

    Pfister, Roland; Heinemann, Alexander; Kiesel, Andrea; Thomaschke, Roland; Janczyk, Markus

    2012-01-01

    Human actions are guided either by endogenous action plans or by external stimuli in the environment. These two types of action control seem to be mediated by neurophysiologically and functionally distinct systems that interfere if an endogenously planned action suddenly has to be performed in response to an exogenous stimulus. In this case, the…

  12. Do endogenous and exogenous action control compete for perception?

    Science.gov (United States)

    Pfister, Roland; Heinemann, Alexander; Kiesel, Andrea; Thomaschke, Roland; Janczyk, Markus

    2012-04-01

    Human actions are guided either by endogenous action plans or by external stimuli in the environment. These two types of action control seem to be mediated by neurophysiologically and functionally distinct systems that interfere if an endogenously planned action suddenly has to be performed in response to an exogenous stimulus. In this case, the endogenous representation has to be deactivated first to give way to the exogenous system. Here we show that interference of endogenous and exogenous action control is not limited to motor-related aspects but also affects the perception of action-related stimuli. Participants associated two actions with contingent sensory effects in learning blocks. In subsequent test blocks, preparing one of these actions specifically impaired responding to the associated effect in an exogenous speeded detection task, yielding a blindness-like effect for arbitrary, learned action effects. In accordance with the theory of event coding, this finding suggests that action planning influences perception even in the absence of any physical similarities between action and to-be-perceived stimuli.

  13. Exogenous ethylene inhibits sprout growth in onion bulbs.

    Science.gov (United States)

    Bufler, Gebhard

    2009-01-01

    Exogenous ethylene has recently gained commercial interest as a sprouting inhibitor of onion bulbs. The role of ethylene in dormancy and sprouting of onions, however, is not known. A cultivar (Allium cepa 'Copra') with a true period of dormancy was used. Dormant and sprouting states of onion bulbs were treated with supposedly saturating doses of ethylene or with the ethylene-action inhibitor 1-methylcyclopropene (1-MCP). Initial sprouting was determined during storage at 18 degrees C by monitoring leaf blade elongation in a specific size class of leaf sheaths. Changes in ATP content and sucrose synthase activity in the sprout leaves, indicators of the sprouting state, were determined. CO(2) and ethylene production of onion bulbs during storage were recorded. Exogenous ethylene suppressed sprout growth of both dormant and already sprouting onion bulbs by inhibiting leaf blade elongation. In contrast to this growth-inhibiting effect, ethylene stimulated CO(2) production by the bulbs about 2-fold. The duration of dormancy was not significantly affected by exogenous ethylene. However, treatment of dormant bulbs with 1-MCP caused premature sprouting. Exogenous ethylene proved to be a powerful inhibitor of sprout growth in onion bulbs. The dormancy breaking effect of 1-MCP indicates a regulatory role of endogenous ethylene in onion bulb dormancy.

  14. Endogenous versus exogenous growth factor regulation of articular chondrocytes.

    Science.gov (United States)

    Shi, Shuiliang; Chan, Albert G; Mercer, Scott; Eckert, George J; Trippel, Stephen B

    2014-01-01

    Anabolic growth factors that regulate the function of articular chondrocytes are candidates for articular cartilage repair. Such factors may be delivered by pharmacotherapy in the form of exogenous proteins, or by gene therapy as endogenous proteins. It is unknown whether delivery method influences growth factor effectiveness in regulating articular chondrocyte reparative functions. We treated adult bovine articular chondrocytes with exogenous recombinant insulin-like growth factor-I (IGF-I) and transforming growth factor-beta1 (TGF-β1), or with the genes encoding these growth factors for endogenous production. Treatment effects were measured as change in chondrocyte DNA content, glycosaminoglycan production, and aggrecan gene expression. We found that IGF-I stimulated chondrocyte biosynthesis similarly when delivered by either exogenous or endogenous means. In contrast, exogenous TGF-β1 stimulated these reparative functions, while endogenous TGF-β1 had little effect. Endogenous TGF-β1 became more bioactive following activation of the transgene protein product. These data indicate that effective mechanisms of growth factor delivery for articular cartilage repair may differ for different growth factors. In the case of IGF-I, gene therapy or protein therapy appear to be viable options. In contrast, TGF-β1 gene therapy may be constrained by a limited ability of chondrocytes to convert latent complexes to an active form. Published 2013 by Wiley Periodicals, Inc. on behalf of the Orthopaedic Research Society. This article is a U.S. Government work and is in the public domain in the USA.

  15. Optimizing Multireservoir System Operating Policies Using Exogenous Hydrologic Variables

    Science.gov (United States)

    Pina, Jasson; Tilmant, Amaury; Côté, Pascal

    2017-11-01

    Stochastic dual dynamic programming (SDDP) is one of the few available algorithms to optimize the operating policies of large-scale hydropower systems. This paper presents a variant, called SDDPX, in which exogenous hydrologic variables, such as snow water equivalent and/or sea surface temperature, are included in the state space vector together with the traditional (endogenous) variables, i.e., past inflows. A reoptimization procedure is also proposed in which SDDPX-derived benefit-to-go functions are employed within a simulation carried out over the historical record of both the endogenous and exogenous hydrologic variables. In SDDPX, release policies are now a function of storages, past inflows, and relevant exogenous variables that potentially capture more complex hydrological processes than those found in traditional SDDP formulations. To illustrate the potential gain associated with the use of exogenous variables when operating a multireservoir system, the 3,137 MW hydropower system of Rio Tinto (RT) located in the Saguenay-Lac-St-Jean River Basin in Quebec (Canada) is used as a case study. The performance of the system is assessed for various combinations of hydrologic state variables, ranging from the simple lag-one autoregressive model to more complex formulations involving past inflows, snow water equivalent, and winter precipitation.

  16. Competition Between Endogenous and Exogenous Orienting of Visual Attention

    Science.gov (United States)

    Berger, Andrea; Henik, Avishai; Rafal, Robert

    2005-01-01

    The relation between reflexive and voluntary orienting of visual attention was investigated with 4 experiments: a simple detection task, a localization task, a saccade toward the target task, and a target identification task in which discrimination difficulty was manipulated. Endogenous and exogenous orienting cues were presented in each trial and…

  17. Lagrange-multiplier tests for weak exogeneity: a synthesis.

    NARCIS (Netherlands)

    Boswijk, H.P.; Urbain, J.P.

    1997-01-01

    This paper unifies two seemingly separate approaches to test weak exogeneity in dynamic regression models with Lagrange-multiplier statistics. The first class of tests focuses on the orthogonality between innovations and conditioning variables, and thus is related to the Durbin-Wu-Hausman

  18. Effects of exogenous human insulin dose adjustment on body mass ...

    African Journals Online (AJOL)

    glycaemic control by frequent exogenous insulin injections. To maintain fasting ... mass index in adult patients with type 1 diabetes mellitus at Kalafong Hospital ..... The Diabetes Control and Complications Trial cited in the review by Kaufman[2] also .... in obese insulin-resistant children: A randomized clinical trial. Diabetes ...

  19. Exogenous cycilc AMP and cycilc GMP influence the metabolism of ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-09-01

    Sep 1, 2009 ... well with the metabolic dynamics of exogenous 3H-glycerol within 30 h after injection. Moreover, ... low molecular weight that exist widely in organism and exhibit very ... endogenous tracers for the study of protein and lipid metabolism ..... DM (1998). SAAM ⁄: simulation, analysis, and modeling software for.

  20. Matching cue size and task properties in exogenous attention.

    Science.gov (United States)

    Burnett, Katherine E; d'Avossa, Giovanni; Sapir, Ayelet

    2013-01-01

    Exogenous attention is an involuntary, reflexive orienting response that results in enhanced processing at the attended location. The standard view is that this enhancement generalizes across visual properties of a stimulus. We test whether the size of an exogenous cue sets the attentional field and whether this leads to different effects on stimuli with different visual properties. In a dual task with a random-dot kinematogram (RDK) in each quadrant of the screen, participants discriminated the direction of moving dots in one RDK and localized one red dot. Precues were uninformative and consisted of either a large or a small luminance-change frame. The motion discrimination task showed attentional effects following both large and small exogenous cues. The red dot probe localization task showed attentional effects following a small cue, but not a large cue. Two additional experiments showed that the different effects on localization were not due to reduced spatial uncertainty or suppression of RDK dots in the surround. These results indicate that the effects of exogenous attention depend on the size of the cue and the properties of the task, suggesting the involvement of receptive fields with different sizes in different tasks. These attentional effects are likely to be driven by bottom-up mechanisms in early visual areas.

  1. Genotoxic damage in pathology anatomy laboratory workers exposed to formaldehyde

    International Nuclear Information System (INIS)

    Costa, Solange; Coelho, Patricia; Costa, Carla; Silva, Susana; Mayan, Olga; Silva Santos, Luis; Gaspar, Jorge; Teixeira, Joao Paulo

    2008-01-01

    Formaldehyde (FA) is a chemical traditionally used in pathology and anatomy laboratories as a tissue preservative. Several epidemiological studies of occupational exposure to FA have indicated an increased risk of nasopharyngeal cancers in industrial workers, embalmers and pathology anatomists. There is also a clear evidence of nasal squamous cell carcinomas from inhalation studies in the rat. The postulated mode of action for nasal tumours in rats was considered biologically plausible and considered likely to be relevant to humans. Based on the available data IARC, the International Agency for Research on Cancer, has recently classified FA as a human carcinogen. Although the in vitro genotoxic as well as the in vivo carcinogenic potentials of FA are well documented in mammalian cells and in rodents, evidence for genotoxic effects and carcinogenic properties in humans is insufficient and conflicting thus remains to be more documented. To evaluate the genetic effects of long-term occupational exposure to FA a group of 30 Pathological Anatomy laboratory workers was tested for a variety of biological endpoints, cytogenetic tests (micronuclei, MN; sister chromatid exchange, SCE) and comet assay. The level of exposure to FA was evaluated near the breathing zone of workers, time weighted average of exposure was calculated for each subject. The association between the biomarkers and polymorphic genes of xenobiotic metabolising and DNA repair enzymes was also assessed. The mean level of exposure was 0.44 ± 0.08 ppm (0.04-1.58 ppm). MN frequency was significantly higher (p = 0.003) in the exposed subjects (5.47 ± 0.76) when compared with controls (3.27 ± 0.69). SCE mean value was significantly higher (p < 0.05) among the exposed group (6.13 ± 0.29) compared with control group (4.49 ± 0.16). Comet assay data showed a significant increase (p < 0.05) of TL in FA-exposed workers (60.00 ± 2.31) with respect to the control group (41.85 ± 1.97). A positive correlation was

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. The analgesic effects of exogenous melatonin in humans.

    Science.gov (United States)

    Andersen, Lars Peter Holst

    2016-10-01

    The hormone, melatonin is produced with circadian rhythm by the pineal gland in humans. The melatonin rhythm provides an endogenous synchronizer, modulating e.g. blood pressure, body temperature, cortisol rhythm, sleep-awake-cycle, immune function and anti-oxidative defence. Interestingly, a number of experimental animal studies demonstrate significant dose-dependent anti-nociceptive effects of exogenous melatonin. Similarly, recent experimental- and clinical studies in humans indicate significant analgesic effects. In study I, we systematically reviewed all randomized studies investigating clinical effects of perioperative melatonin. Meta-analyses demonstrated significant analgesic and anxiolytic effects of melatonin in surgical patients, equating reductions of 20 mm and 19 mm, respectively on a VAS, compared with placebo. Profound heterogeneity between the included studies was, however, present. In study II, we aimed to investigate the analgesic, anti-hyperalgesic and anti-inflammatory effects of exogenous melatonin in a validated human inflammatory pain model, the human burn model. The study was performed as a randomized, double blind placebo-controlled crossover study. Primary outcomes were pain during the burn injury and areas of secondary hyperalgesia. No significant effects of exogenous melatonin were observed with respect to primary or secondary outcomes, compared to placebo. Study III and IV estimated the pharmacokinetic variables of exogenous melatonin. Oral melatonin demonstrated a t max value of 41 minutes. Bioavailability of oral melatonin was only 3%. Elimination t 1/2 were approximately 45 minutes following both oral and intravenous administration, respectively. High-dose intravenous melatonin was not associated with increased sedation, in terms of simple reaction times, compared to placebo. Similarly, no other adverse effects were reported. In Study V, we aimed to re-analyse data obtained from a randomized analgesic drug trial by a selection of

  4. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  5. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  6. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  7. Genotoxic Biomarkers in Erythrocytes of Lepidochelys olivacea (Cheloniidae from Colombia

    Directory of Open Access Journals (Sweden)

    Victor Hugo Quiroz Herrera

    2017-09-01

    Full Text Available This research was conducted in the municipality of Bahia Solano, Colombia, and had as a goal to detect damage erythrocytes circulating with nuclear lesions in fifty-five Olive Ridley adult females using acridine orange immunostain, and correlate its frequencies with some physiological and biometric parameters. We determine a micronucleated erythrocytes (MNE frequency of 0.6 ± 0.6 and nuclear buds (NBE of 2.1 ± 1.9. We not found any relationship between the nuclear lesions with physiological or biometric parameters evaluated (Pearson and Kruskal-Wallis, p<0.05. We define a significative statistical difference (p=0.035 between both nuclear lesions frequencies. This results show nuclear damages in erythrocytes of Olive Ridley sea turtle for the first time in Colombia as an outcome of genotoxic stress. Also contributes key information for future research in the ecotoxicology area for endangered marine species.

  8. The potential for new methods to assess human reproductive genotoxicity

    International Nuclear Information System (INIS)

    Mendelsohn, M.L.

    1987-09-01

    The immediate prospects are not good for practical methods for measuring the human heritable mutation rate. The methods discussed here range from speculative to impractical, and at best are sensitive enough only for large numbers of subjects. Given the rapid development of DNA methods and the current status of two-dimensional gel electrophoresis, there is some hope that the intermediate prospects may be better. In contrast, the prospects for useful cellular-based male germinal methods seem more promising and immediate. Effective specific locus methods for sperm are already conceivable and may be practical in a few years. Obviously such methods will not predict heritable effects definitively, but they will provide direct information on reproductive genotoxicity and should contribute significantly to many current medical and environmental situations where genetic damage is suspected. 22 refs

  9. Genotoxicity and potential carcinogenicity of cyanobacterial toxins - a review.

    Science.gov (United States)

    Zegura, Bojana; Straser, Alja; Filipič, Metka

    2011-01-01

    The occurrence of cyanobacterial blooms has increased significantly in many regions of the world in the last century due to water eutrophication. These blooms are hazardous to humans, animals, and plants due to the production of cyanotoxins, which can be classified in five different groups: hepatotoxins, neurotoxins, cytotoxins, dermatotoxins, and irritant toxins (lipopolysaccharides). There is evidence that certain cyanobacterial toxins are genotoxic and carcinogenic; however, the mechanisms of their potential carcinogenicity are not well understood. The most frequently occurring and widespread cyanotoxins in brackish and freshwater blooms are the cyclic heptapeptides, i.e., microcystins (MCs), and the pentapeptides, i.e., nodularins (NODs). The main mechanism associated with potential carcinogenic activity of MCs and NOD is the inhibition of protein phosphatases, which leads to the hyperphosphorylation of cellular proteins, which is considered to be associated with their tumor-promoting activity. Apart from this, MCs and NOD induce increased formation of reactive oxygen species and, consequently, oxidative DNA damage. There is also evidence that MCs and NOD induce micronuclei, and NOD was shown to have aneugenic activity. Both cyanotoxins interfere with DNA damage repair pathways, which, along with DNA damage, is an important factor involved in the carcinogenicity of these agents. Furthermore, these toxins increase the expression of TNF-α and early-response genes, including proto-oncogenes, genes involved in the response to DNA damage, cell cycle arrest, and apoptosis. Rodent studies indicate that MCs and NOD are tumor promotors, whereas NOD is thought to have also tumor-initiating activity. Another cyanobacterial toxin, cylindrospermopsin (CYN), which has been neglected for a long time, is lately being increasingly found in the freshwater environment. The principal mechanism of its toxicity is the irreversible inhibition of protein synthesis. It is pro-genotoxic

  10. Effects of wood dust:Inflammation, Genotoxicity and Cancer

    DEFF Research Database (Denmark)

    Lange, Jette Bornholdt

    cell line A549 measuring inflammatory and DNA damaging effects. The second part consists of a molecular analysis of the K-ras gene for mutations in the hotspots codons in human sinonasal cancers. Design, calibration and validation of the assays were performed. Cancer at the sinonasal cavities is rare...... with incidence rates between of 0.3 to 1.4 per 100,000 for men and 0.1 to 0.8 per 100,000 for women in Europe, depending on country. However, cancer at this site is associated with occupational exposures including wood dust. Especially the adenocarcinoma subtype is strongly associated with exposure to wood dust...... and their potential to cause DNA damage. Contrary to our hypothesis, we showed that pure wood dust is able to cause primary DNA damage, independent of inflammation as well as hardwoods had no higher inflammatory or genotoxic potential than softwoods. To investigate the molecular mechanisms behind the wood dust...

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  13. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  14. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  15. Comet Assay on Daphnia magna in eco-genotoxicity testing.

    Science.gov (United States)

    Pellegri, Valerio; Gorbi, Gessica; Buschini, Annamaria

    2014-10-01

    Detection of potentially hazardous compounds in water bodies is a priority in environmental risk assessment. For the evaluation and monitoring of water quality, a series of methodologies may be applied. Among them, the worldwide used toxicity tests with organisms of the genus Daphnia is one of the most powerful. In recent years, some attempts were made to utilize Daphnia magna in genotoxicity testing as many of the new environmental contaminants are described as DNA-damaging agents in aquatic organisms. The aim of this research was to develop a highly standardized protocol of the Comet Assay adapted for D. magna, especially regarding the isolation of cells derived from the same tissue (haemolymph) from newborn organisms exposed in vivo. Several methods for haemolymph extraction and different Comet Assay parameters were compared. Electrophoretic conditions were adapted in order to obtain minimum DNA migration in cells derived from untreated organisms and, at the same time, maximum sensitivity in specimens treated with known genotoxicants (CdCl2 and H2O2). Additional tests were performed to investigate if life-history traits of the cladoceran (such as the age of adult organisms that provide newborns, the clutch size of origin, the number of generations reared in standard conditions) and the water composition as well, might influence the response of the assay. This study confirms the potential application of the Comet Assay in D. magna for assessing genotoxic loads in aqueous solution. The newly developed protocol could integrate the acute toxicity bioassay, thus expanding the possibility of using this model species in freshwater monitoring (waters, sediment and soil elutriates) and is in line with the spirit of the EU Water Framework Directive in reducing the number of bioassays that involve medium-sized species. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Genotoxicity profile of erinacine A-enriched Hericium erinaceus mycelium

    Directory of Open Access Journals (Sweden)

    I-Chen Li

    2014-01-01

    Full Text Available Hericium erinaceus (H. erinaceus has a long history of usage in traditional Chinese medicine for the treatment of gastric disorders. Recently, it has become a well-established candidate in causing positive brain and nerve health-related activities by inducing nerve growth factor (NGF from its bioactive ingredient, erinacine A. This active compound, which exists only in fermented mycelium but not in its fruiting body, increases NGF levels in astroglial cells in vitro as well as catecholamine and NGF levels in vivo. With increasing recognition of erinacine A in H. erinaceus (EAHE mycelium improving neurodegenerative diseases, numerous products are being marketed based on these functional claims. To our knowledge, there have been no reports on the mutagenicity of EAHE prior to this paper. Hence, the present study was undertaken to determine the mutagenicity and genotoxicity effects of EAHE mycelium conducted in three standard battery of tests (reverse mutation, chromosomal aberration, and micronuclei tests according to the latest guidelines in order to meet all international regulatory requirements and provide information on the safety of this new and promising natural remedy. Our results have indicated that EAHE mycelium did not significantly increase the number of revertant colonies in the bacterial reverse mutation test nor induce higher frequency of aberrations in the chromosome aberration test. Moreover, no statistically significant EAHE mycelium-related increase was observed in the incidence of reticulocytes per 1000 red blood cells and micronucleated reticulocytes per 1000 reticulocytes. In conclusion, the three standard battery of tests suggested that EAHE mycelium was devoid of mutagenicity and genotoxicity in the tested doses and experimental conditions.

  17. Pb low doses induced genotoxicity in Lactuca sativa plants.

    Science.gov (United States)

    Silva, S; Silva, P; Oliveira, H; Gaivão, I; Matos, M; Pinto-Carnide, O; Santos, C

    2017-03-01

    Soil and water contamination by lead (Pb) remains a topic of great concern, particularly regarding crop production. The admissible Pb values in irrigation water in several countries range from ≈0.1 to ≈5 mg L -1 . In order to evaluate putative effects of Pb within legal doses on crops growth, we exposed Lactuca sativa seeds and seedlings to increasing doses of Pb(NO 3 ) 2 up to 20 mg L -1 . The OECD parameter seed germination and seedling/plant growth were not affected by any of the Pb-concentrations used. However, for doses higher than 5 mg L -1 significant DNA damage was detected: Comet assay detected DNA fragmentation at ≥ 5 mg L -1 and presence of micronuclei (MN) were detected for 20 mg L -1 . Also, cell cycle impairment was observed for doses as low as 0.05 mg L -1 and 0.5 mg L -1 (mostly G 2 arrest). Our data show that for the low doses of Pb used, the OECD endpoints were not able to detect toxicity, while more sensitive endpoints (related with DNA damage and mitotic/interphase disorders) identified genotoxic and cytostatic effects. Furthermore, the nature of the genotoxic effect was dependent on the concentration. Finally, we recommend that MN test and the comet assay should be included as sensitive endpoints in (eco)toxicological assays. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  18. Genotoxicity profile of erinacine A-enriched Hericium erinaceus mycelium.

    Science.gov (United States)

    Li, I-Chen; Chen, Yen-Lien; Chen, Wan-Ping; Lee, Li-Ya; Tsai, Yueh-Ting; Chen, Chin-Chu; Chen, Chin-Shuh

    2014-01-01

    Hericium erinaceus ( H. erinaceus ) has a long history of usage in traditional Chinese medicine for the treatment of gastric disorders. Recently, it has become a well-established candidate in causing positive brain and nerve health-related activities by inducing nerve growth factor (NGF) from its bioactive ingredient, erinacine A. This active compound, which exists only in fermented mycelium but not in its fruiting body, increases NGF levels in astroglial cells in vitro as well as catecholamine and NGF levels in vivo . With increasing recognition of erinacine A in H. erinaceus (EAHE) mycelium improving neurodegenerative diseases, numerous products are being marketed based on these functional claims. To our knowledge, there have been no reports on the mutagenicity of EAHE prior to this paper. Hence, the present study was undertaken to determine the mutagenicity and genotoxicity effects of EAHE mycelium conducted in three standard battery of tests (reverse mutation, chromosomal aberration, and micronuclei tests) according to the latest guidelines in order to meet all international regulatory requirements and provide information on the safety of this new and promising natural remedy. Our results have indicated that EAHE mycelium did not significantly increase the number of revertant colonies in the bacterial reverse mutation test nor induce higher frequency of aberrations in the chromosome aberration test. Moreover, no statistically significant EAHE mycelium-related increase was observed in the incidence of reticulocytes per 1000 red blood cells and micronucleated reticulocytes per 1000 reticulocytes. In conclusion, the three standard battery of tests suggested that EAHE mycelium was devoid of mutagenicity and genotoxicity in the tested doses and experimental conditions.

  19. Molecular and cytogenetic evaluation for potential genotoxicity of hydrocortisone

    Directory of Open Access Journals (Sweden)

    Maha Aly Fahmy

    2015-09-01

    Full Text Available Objective: To assess the risk of hydrocortisone sodium succinate through different end points of genotoxicity. Methods: The study examined the induction of chromosomal aberrations in bone marrow cells, morphological sperm abnormalities, the effect on dominant lethal gene and protein synthesis. Hydrocortisone was given intraperitoneally at three dose levels 26, 39 and 52 mg/kg body weight which was equivalent to the therapeutic doses in man. Results: The results showed that single dose treatment with different doses had no effect on chromosomal aberrations. The dose of 52 mg/kg body weight induced significant percentage of chromosomal aberrations in bone marrow cells after repeated treatment for 7 and 14 days. Significant effect of morphological sperm abnormalities was demonstrated only after treatment with the dose of 52 mg/kg body weight. For examining the dominant lethal mutation, male mice were injected with dose of 39 mg/kg body weight for 5 consecutive days. Mating between treated males and virgin untreated females were performed at different time intervals. The results showed that the percentage of fertile mating at 1–7 and 8–14 days reduced to 50% and 60% respectively compared with control group while no effect was recorded at 15–21 days. The percentage of dominant lethal mutation reached 0.32%, 4.4% and 0% in mating intervals respectively indicating pronounced effect of hydrocortisone at the interval 8–14 days which represented by the late spermatids. The results also showed that the repeated treatment with the dose of 52 mg/kg body weight inhibited protein synthesis which contributed to the cytotoxic effect of the drug. Conclusions: It is concluded that long term treatment with large doses of hydrocortisone may have genotoxic effect.

  20. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  1. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  2. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  3. Development of a Transgenic Model to Assess Bioavailable Genotoxicity in Sediments

    National Research Council Canada - National Science Library

    1999-01-01

    This technical note describes the rationale for using transgenic animal models to assess the potential genotoxicity of sediments, the benefits that can be obtained using such models versus currently...

  4. Genotoxic evaluation of an industrial effluent from an oil refinery using plant and animal bioassays

    Directory of Open Access Journals (Sweden)

    Fernando Postalli Rodrigues

    2010-01-01

    Full Text Available Polycyclic aromatic hydrocarbons (PAHs are genotoxic chemicals commonly found in effluents from oil refineries. Bioassays using plants and cells cultures can be employed for assessing environmental safety and potential genotoxicity. In this study, the genotoxic potential of an oil refinery effluent was analyzed by means of micronucleus (MN testing of Alium cepa, which revealed no effect after 24 h of treatment. On the other hand, primary lesions in the DNA of rat (Rattus norvegicus hepatoma cells (HTC were observed through comet assaying after only 2 h of exposure. On considering the capacity to detect DNA damage of a different nature and of these cells to metabolize xenobiotics, we suggest the association of the two bioassays with these cell types, plant (Allium cepa and mammal (HTC cells, for more accurately assessing genotoxicity in environmental samples.

  5. Genotoxic evaluation of an industrial effluent from an oil refinery using plant and animal bioassays.

    Science.gov (United States)

    Rodrigues, Fernando Postalli; Angeli, José Pedro Friedmann; Mantovani, Mário Sérgio; Guedes, Carmen Luisa Barbosa; Jordão, Berenice Quinzani

    2010-01-01

    Polycyclic aromatic hydrocarbons (PAHs) are genotoxic chemicals commonly found in effluents from oil refineries. Bioassays using plants and cells cultures can be employed for assessing environmental safety and potential genotoxicity. In this study, the genotoxic potential of an oil refinery effluent was analyzed by means of micronucleus (MN) testing of Alium cepa, which revealed no effect after 24 h of treatment. On the other hand, primary lesions in the DNA of rat (Rattus norvegicus) hepatoma cells (HTC) were observed through comet assaying after only 2 h of exposure. On considering the capacity to detect DNA damage of a different nature and of these cells to metabolize xenobiotics, we suggest the association of the two bioassays with these cell types, plant (Allium cepa) and mammal (HTC) cells, for more accurately assessing genotoxicity in environmental samples.

  6. Genotoxicity and ELF-magnetic fields: a review through the micronucleus assay

    International Nuclear Information System (INIS)

    Alcaraz, M.; Andreu-Galvez, M.; Sanchez-Villalobos, J. M.; Achel, D. G.; Olmos, E.; Martinez-Hernandez, C. M.

    2012-01-01

    Thirty for (34) published studies, conducted from 1994 to the present to evaluate the genotoxic effect of magnetic fields using ELF-EMF and diagnostic resonance on humans by the micronucleus assay have been reviewed. some characteristics of the assay methods, their significance to genotoxicity and basic interpretations of the results of these assays are discussed. of the studies analysed 70.5% implicated genotoxic effects induced by these magnetic fields: 52.9% were due to exposure to magnetic fields only and 17,6% by exposure to magnetic fields in combination with some treatment types, resulting in additive or synergistic effect. Evidence exist to support the notion that exposure of humans to magnetic fields stimulates genotoxic effects, although the actual mechanisms of action or even the true human health consequences resulting from these exposure still remain unclear. (Author) 80 refs.

  7. Measurement of DNA strand breaks as a biomarker of genotoxic pollutants

    Digital Repository Service at National Institute of Oceanography (India)

    Sarkar, A.; Patil, S.S.; Holkar, P.K.R.

    This paper deals with the development of a molecular biomarker technique by measurement of DNA integrity in marine organisms for biomonitoring of pollution due to genotoxic compounds. The marine environment is continuously being polluted...

  8. Genotoxicity Biomonitoring Along a Coastal Zone Under Influence of Offshore Petroleum Exploration (Southeastern Brazil).

    Science.gov (United States)

    Gutiérrez, Juan Manuel; da Conceição, Moisés Basilio; Molisani, Mauricio Mussi; Weber, Laura Isabel

    2018-03-01

    Offshore oil exploration creates threats to coastal ecosystems, including increasing urbanization and associated effluent releases. Genotoxicity biomarkers in mussels were determined across a gradient of coastal zone influences of offshore petroleum exploration in southeastern Brazil. Coastal ecosystems such as estuaries, beaches and islands were seasonally monitored for genotoxicity evaluation using the brown mussel Perna perna. The greatest DNA damage (5.2% ± 1.9% tail DNA and 1.5‰  ± 0.8‰ MN) were observed in urban estuaries, while Santana Archipelago showed levels of genotoxicity near zero and is considered a reference site. Mussels from urban and pristine beaches showed intermediate damage levels, but were also influenced by urbanization. Thus, mussel genotoxicity biomarkers greatly indicated the proposed oil exploration and urbanization scenarios that consequently are genetically affecting coastal organisms.

  9. Acute toxicity and genotoxicity of fermented traditional medicine oyaksungi-san

    Directory of Open Access Journals (Sweden)

    Hwayong Park

    2017-06-01

    Conclusion: As a whole, no acute toxicity or genotoxicity were observed in all the assays examined. Therefore, fermented OY is considered to be a safe material that can be used for development of complementary and alternative medicine using bioconversion.

  10. Genotoxic effects of boric acid and borax in zebrafish, Danio rerio using alkaline comet assay.

    Science.gov (United States)

    Gülsoy, Nagihan; Yavas, Cüneyd; Mutlu, Özal

    2015-01-01

    The present study is conducted to determine the potential mechanisms of Boron compounds, boric acid (BA) and borax (BX), on genotoxicity of zebrafish Danio rerio for 24, 48, 72 and 96-hours acute exposure (level:1, 4, 16, 64 mg/l BA and BX) in semi-static bioassay experiment. For that purpose, peripheral erythrocytes were drawn from caudal vein and Comet assay was applied to assess genotoxicity. Acute (96 hours) exposure and high concentrations of boric acid and borax increases % tail DNA and Olive tail moment. Genotoxicity was found for BA as concentration-dependent and BX as concentration and time dependent manner. In general, significant effects (P borax-induced genotoxicity in fish.

  11. The influence of abiotic factors present in the Rio de la Plata over the chromium genotoxicity

    International Nuclear Information System (INIS)

    Lopez, L.C.; Moretton, J.

    1997-01-01

    The alterations suffered by the well-known environmental genotoxic agent, Cr(V I), were studied. Cr(V I) salts were dissolved in water effluent river receptors waters such as from the Rio de la Plata. The influence of abiotic factors present in this kind of water was evaluated using the Rec. assay in Bacillus subtilis. The results detected a soluble fraction that potentiated Cr(V I) genotoxicity. This substance (or group of substances) is sensible to sterilization by heat and UV radiation, and its activity seems to decrease with particulate matter. Its genotoxicity was not affected by high concentrations of particulate matter in the Rio de la Plata water. In samples where chromium salts were added to raw river water, abiotic interference due to sterilization process occurred. A decrease in genotoxicity was found after filtration through inorganic filters (0.22 μ m) and an increase was noticed after exposure to UV radiation. (Author)

  12. COMPARATIVE GENOTOXIC RESPONSES TO ARSENITE IN GUINEA PIG, MOUSE, RAT AND HUMAN LYMPHOCYTES

    Science.gov (United States)

    Comparative genotoxic responses to arsenite in guinea pig, mouse, rat and human lymphocytes.Inorganic arsenic is a known human carcinogen causing skin, lung, and bladder cancer following chronic exposures. Yet, long-term laboratory animal carcinogenicity studies have ...

  13. Genotoxic Effects of Titanium Dioxide and Cerium Dioxide Nanoparticles in Human Respiratory Epithelial Cells

    Science.gov (United States)

    The nanomaterial industry has recently seen rapid growth, therefore, the risk assessment of human exposure to nanomaterials in consumer products is of paramount importance. The genotoxicity of nanomaterials is a fundamental aspect of hazard identification and regulatory guidance....

  14. The Genotoxicity of Titanium Dioxide and Cerium Dioxide Nanoparticles in Human Respiratory Epithelial Cells

    Science.gov (United States)

    Due to the exponential growth of the nanomaterial industry, risk assessment of human exposure to nanomaterials in consumer products is of paramount importance. The genotoxicity of nanomaterials is an important aspect of hazard identification and regulatory guidance. However, this...

  15. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  16. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  17. Genotoxic Effects of Exposure to Gasoline Fumes on Petrol Pump Workers

    OpenAIRE

    Amrin Shaikh; Darshana Barot; Divya Chandel

    2018-01-01

    Background: Petrol pump workers are occupationally exposed to gasoline and its fumes consisting of several mutagenic chemicals. Objective: To evaluate the genotoxic effects of exposure to gasoline fumes on petrol pump workers. Methods: The study groups included 70 petrol pump workers (exposed group) and 70 healthy age-matched individuals with no known exposure (comparison group). Buccal micronucleus cytome assay (BMCyt) was performed to check the genotoxicity caused due to inhalation ...

  18. Genotoxicity assessment data for exfoliated buccal cells exposed to mobile phone radiation

    Directory of Open Access Journals (Sweden)

    F.M. de Oliveira

    2017-12-01

    Full Text Available Healthy mobile phone users aged 18–30 y.o. provided exfoliated buccal cells samples from the right and left inner cheeks. A total of 2000 cells per subject were screened for the presence of micronuclei as a sign of genotoxic damage, according to the mobile phone use profile of each user. Keywords: Electromagnetic fields, Mobile phones, Genotoxicity, Micronuclei, Exfoliated buccal cells, Feulgen stain

  19. The use of ex vivo human skin tissue for genotoxicity testing

    International Nuclear Information System (INIS)

    Reus, Astrid A.; Usta, Mustafa; Krul, Cyrille A.M.

    2012-01-01

    As a result of the chemical legislation concerning the registration, evaluation, authorization and restriction of chemicals (REACH), and the Seventh Amendment to the Cosmetics Directive, which prohibits animal testing in Europe for cosmetics, alternative methods for safety evaluation of chemicals are urgently needed. Current in vitro genotoxicity assays are not sufficiently predictive for the in vivo situation, resulting in an unacceptably high number of misleading positives. For many chemicals and ingredients of personal care products the skin is the first site of contact, but there are no in vitro genotoxicity assays available in the skin for additional evaluation of positive or equivocal responses observed in regulatory in vitro genotoxicity assays. In the present study ex vivo human skin tissue obtained from surgery was used for genotoxicity evaluation of chemicals by using the comet assay. Fresh ex vivo human skin tissue was cultured in an air–liquid interface and topically exposed to 20 chemicals, including true positive, misleading positive and true negative genotoxins. Based on the results obtained in the present study, the sensitivity, specificity and accuracy of the ex vivo skin comet assay to predict in vivo genotoxicity were 89%, 90% and 89%, respectively. Donor and experimental variability were mainly reflected in the magnitude of the response and not the difference between the presence and absence of a genotoxic response. The present study indicates that human skin obtained from surgery is a promising and robust model for safety evaluation of chemicals that are in direct contact with the skin. -- Highlights: ► We use human skin obtained from surgery for genotoxicity evaluation of chemicals. ► We use the comet assay as parameter for genotoxicity in ex vivo human skin. ► Sensitivity, specificity and accuracy to predict in vivo genotoxins are determined. ► Sensitivity, specificity and accuracy are 89%, 90% and 90%, respectively. ► The method

  20. The use of ex vivo human skin tissue for genotoxicity testing

    Energy Technology Data Exchange (ETDEWEB)

    Reus, Astrid A.; Usta, Mustafa [TNO Triskelion BV, Utrechtseweg 48, 3704 HE, Zeist (Netherlands); Krul, Cyrille A.M., E-mail: cyrille.krul@tno.nl [TNO, Utrechtseweg 48, 3704 HE Zeist (Netherlands)

    2012-06-01

    As a result of the chemical legislation concerning the registration, evaluation, authorization and restriction of chemicals (REACH), and the Seventh Amendment to the Cosmetics Directive, which prohibits animal testing in Europe for cosmetics, alternative methods for safety evaluation of chemicals are urgently needed. Current in vitro genotoxicity assays are not sufficiently predictive for the in vivo situation, resulting in an unacceptably high number of misleading positives. For many chemicals and ingredients of personal care products the skin is the first site of contact, but there are no in vitro genotoxicity assays available in the skin for additional evaluation of positive or equivocal responses observed in regulatory in vitro genotoxicity assays. In the present study ex vivo human skin tissue obtained from surgery was used for genotoxicity evaluation of chemicals by using the comet assay. Fresh ex vivo human skin tissue was cultured in an air–liquid interface and topically exposed to 20 chemicals, including true positive, misleading positive and true negative genotoxins. Based on the results obtained in the present study, the sensitivity, specificity and accuracy of the ex vivo skin comet assay to predict in vivo genotoxicity were 89%, 90% and 89%, respectively. Donor and experimental variability were mainly reflected in the magnitude of the response and not the difference between the presence and absence of a genotoxic response. The present study indicates that human skin obtained from surgery is a promising and robust model for safety evaluation of chemicals that are in direct contact with the skin. -- Highlights: ► We use human skin obtained from surgery for genotoxicity evaluation of chemicals. ► We use the comet assay as parameter for genotoxicity in ex vivo human skin. ► Sensitivity, specificity and accuracy to predict in vivo genotoxins are determined. ► Sensitivity, specificity and accuracy are 89%, 90% and 90%, respectively. ► The method

  1. In Vitro Genotoxic Effects of Four Helichrysum Species in Human Lymphocytes Cultures

    OpenAIRE

    Erolu, Erhan H; Hamzaolu, Ergin; Aksoy, Ahmet; Budak, Ümit; Özkul, Yusuf

    2010-01-01

    Helichrysum sanguineum, Helichrysum pamphylicum, Helichrysum orientale, Helichrysum noeanum (Asteraceae) are medicinal plants. For centuries, they have been used as tea in Turkey because of their medicinal properties. So far no scientifc evidence has been found in a literature survey regarding the genotoxic effects of these plants. This work evaluated the genotoxic effects on human lymphocyte cultures induced by methanol extracts of these plants, assayed in different concentrations (0.01, 0.0...

  2. Mutagenic and genotoxic activity of particulate matter MP2,5, in Pamplona, North Santander, Colombia

    OpenAIRE

    Martínez Montañez, Mónica Liseth; Meléndez Gélvez, Iván; Quijano Parra, Alfonso

    2012-01-01

    Objective: To study the mutagenic and genotoxic activities of particulate material (MP2,5 collected in Pamplona, Norte de Santander, Colombia.Materials and methods: MP2,5 was monitored by means of a Partisol 2025 sequential air sampler with Plus Palmflex quartz filters. The latter were subjected to two extraction procedures: Soxhlet extraction using dichloromethane-acetone; and ultrasonic extraction using dichloromethane, acetone and dichloromethane/ acetone mix. The mutagenic and genotoxic a...

  3. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  4. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  5. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  6. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  7. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  8. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  9. Static magnetic field reduced exogenous oligonucleotide uptake by spermatozoa using magnetic nanoparticle gene delivery system

    Science.gov (United States)

    Katebi, Samira; Esmaeili, Abolghasem; Ghaedi, Kamran

    2016-03-01

    Spermatozoa could introduce exogenous oligonucleotides of interest to the oocyte. The most important reason of low efficiency of sperm mediated gene transfer (SMGT) is low uptake of exogenous DNA by spermatozoa. The aim of this study was to evaluate the effects of static magnetic field on exogenous oligonucleotide uptake of spermatozoa using magnetofection method. Magnetic nanoparticles (MNPs) associated with the labeled oligonucleotides were used to increase the efficiency of exogenous oligonucleotide uptake by rooster spermatozoa. We used high-field/high-gradient magnet (NdFeB) to enhance and accelerate exogenous DNA sedimentation at the spermatozoa surface. Flow cytometry analysis was performed to measure viability and percentage of exogenous oligonucleotide uptake by sperm. Flow cytometry analysis showed a significant increase in exogenous oligonucleotide uptake by rooster spermatozoa (Prooster spermatozoa; however unlike others studies, static magnetic field, was not only ineffective to enhance exogenous oligonucleotide uptake by rooster spermatozoa but also led to reduction in efficiency of magnetic nanoparticles in gene transfer.

  10. Treatment with exogenous surfactant stimulates endogenous surfactant synthesis in premature infants with respiratory distress syndrome

    NARCIS (Netherlands)

    Bunt, JEH; Carnielli, VP; Janssen, DJ; Wattimena, JLD; Hop, WC; Sauer, PJ; Zimmermann, LJI

    2000-01-01

    Objective: Treatment of preterm infants with respiratory distress syndrome (RDS) with exogenous surfactant has greatly improved clinical outcome. Some infants require multiple doses, and it has not been studied whether these large amounts of exogenous surfactant disturb endogenous surfactant

  11. The genotoxic contribution of wood smoke to indoor respirable suspended particles

    Energy Technology Data Exchange (ETDEWEB)

    Boone, P.M. (John B. Pierce Foundation Laboratory, New Haven, CT (USA)); Rossman, T.G. (New York Univ. Medical Center, New York (USA)); Daisey, J.M. (Lawrence Berkeley Laboratory, CA (USA))

    1989-01-01

    The effect of wood burning stoves on the genotoxicity of indoor respirable organic matter was investigated for four homes during the winter and spring of 1986. Paired samples, one collected when the stove was not used and one when wood was burned, were extracted with dichloromethane and acetone. Aliquots of the dichloromethane extracts were analyzed with and without metabolic activation using the Microscreen bioassay. The Microscreen is a rapid, sensitive bioassay which measures a broad genotoxic endpoint, {lambda}-prophage induction. Per nanogram of organic material, wood smoke proved to be a major source of indirect (observed with metabolic activation) but not direct genotoxins in homes. The increase in indirect genotoxicity for extracts from aerosol containing wood smoke is probably due to higher concentrations of polycyclic aromatic hydrocarbons in the wood smoke aerosol as well as other unidentified classes. The direct genotoxicity observed for extracts of aerosol not containing wood smoke decreased with metabolic activation. This direct genotoxicity may be related to cooking activities in the homes. The trends in genotoxicity observed per nanogram of organic material are more pronounced when expressed per m{sup 3} of air due to the higher percentage of extractable material in aerosol containing wood smoke.

  12. Cytotoxicity and genotoxicity of clothianidin in human lymphocytes with or without metabolic activation system.

    Science.gov (United States)

    Atlı Şekeroğlu, Zülal; Şekeroğlu, Vedat; Uçgun, Ebru; Kontaş Yedier, Seval; Aydın, Birsen

    2018-02-26

    Clothianidin (CHN) is a broad-spectrum neonicotinoid insecticide. Limited studies have been carried out on the cytotoxic and genotoxic effects of both CHN using different genotoxicity tests in human cells with or without human metabolic activation system (S9 mix). Therefore, the aim of this study is to investigate the cytotoxic and genotoxic effects of CHN and its metabolites on human lymphocyte cultures with or without S9 mix using chromosomal aberration (CA) and micronucleus (MN) tests. The cultures were treated with 25, 50, and 100 µg/ml of CHN in the presence (3 h treatment) and absence (48 h treatment) of S9 mix. Dimethyl sulfoxide (DMSO) was used as a solvent control. CHN showed cytotoxic and genotoxic effects due to significant decreases in mitotic index (MI) and nuclear division index (NDI), and significant increases in the CAs, aberrant cells, and MN formation in the absence of S9 mix when compared with solvent control. However, CHN did not significantly induce cytotoxicity and genotoxicity in the presence of S9 mix. Our results indicated that CHN has cytotoxic, cytostatic, and genotoxic potential on human peripheral blood lymphocyte cultures, but not its metabolites under the experimental conditions.

  13. Evaluation of genotoxicity of nitrile fragrance ingredients using in vitro and in vivo assays.

    Science.gov (United States)

    Bhatia, S P; Politano, V T; Api, A M

    2013-09-01

    Genotoxicity studies were conducted on a group of 8 fragrance ingredients that belong to the nitrile family. These nitriles are widely used in consumer products however there is very limited data in the literature regarding the genotoxicity of these nitriles. The 8 nitriles were assessed for genotoxicity using an Ames test, in vitro chromosome aberration test or in vitro micronucleus test. The positive results observed in the in vitro tests were further investigated using an in vivo micronucleus test. The results from these different tests were compared and these 8 nitriles are not considered to be genotoxic. Dodecanitrile and 2,2,3-trimethylcyclopent-3-enylacetonitrile were negative in the in vitro chromosome aberration test and in vitro micronucleus test, respectively. While citronellyl nitrile, 3-methyl-5-phenylpentanenitrile, cinnamyl nitrile, and 3-methyl-5-phenylpent-2-enenitrile revealed positive results in the in vitro tests, but confirmatory in vivo tests determined these nitriles to be negative in the in vivo micronucleus assay. The remaining two nitriles (benzonitrile and α-cyclohexylidene benzeneacetonitrile) were negative in the in vivo micronucleus test. This study aims to evaluate the genotoxicity potential of these nitriles as well as enrich the literature with genotoxicity data on fragrance ingredients. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Fate of exogenously supplied bacterial DNA in soybean

    Energy Technology Data Exchange (ETDEWEB)

    Ndiku, Luyindula [Commissariat des Sciences Nucleaires, Kinshasa (Zaire). Centre Regional d' Etudes Nucleaires

    1980-01-01

    The fate of exogenously supplied radiolabelled DNA from agrobacterium tumefaciens and micrococcus lysodeikticus was investigated in soybean tissues growing under various physiological conditions. The following observations are made: (a) Rapid degradation and reutilization of the donor DNA was observed in callus tissue culture. (b) Germinating seeds and five-day old seedlings were shown to degrade DNA in the incubation medium and to ultilize these degradation products for their own DNA synthesis. Reutilization could be almost totally suppressed the addition of unlabelled thymidine as a competitor. This allowed a detection of significant amounts of residuel donor closely but transiently associated with the plant tissues. (c) In soybean shoots dipped into a solution of donor DNA, partly this DNA was found to first migrate to the leaves where mostly labelled endogenous DNA was later found. Very large amounts of polymerized exogenous DNA were found in the regenerated roots after 12 days of culture.

  15. Exogenous melatonin improves Malus resistance to Marssonina apple blotch.

    Science.gov (United States)

    Yin, Lihua; Wang, Ping; Li, Mingjun; Ke, Xiwang; Li, Cuiying; Liang, Dong; Wu, Shan; Ma, Xinli; Li, Chao; Zou, Yangjun; Ma, Fengwang

    2013-05-01

    We examined whether exogenously applied melatonin could improve resistance to Marssonina apple blotch (Diplocarpon mali) by apple [Malus prunifolia (Willd.) Borkh. cv. Donghongguo]. This serious disease leads to premature defoliation in the main regions of apple production. When plants were pretreated with melatonin, resistance was increased in the leaves. We investigated the potential roles for melatonin in modulating levels of hydrogen peroxide (H2O2), as well the activities of antioxidant enzymes and pathogenesis-related proteins during these plant-pathogen interactions. Pretreatment enabled plants to maintain intracellular H2O2 concentrations at steady-state levels and enhance the activities of plant defence-related enzymes, possibly improving disease resistance. Because melatonin is safe and beneficial to animals and humans, exogenous pretreatment might represent a promising cultivation strategy to protect plants against this pathogen infection. © 2012 John Wiley & Sons A/S. Published by Blackwell Publishing Ltd.

  16. On the fate of exogenously supplied bacterial DNA in soybean

    International Nuclear Information System (INIS)

    Luyindula Ndiku

    1980-01-01

    The fate of exogenously supplied radiolabelled DNA from agrobacterium tumefaciens and micrococcus lysodeikticus was investigated in soybean tissues growing under various physiological conditions. The following observations are made: a) Rapid degradation and reutilization of the donor DNA was observed in callus tissue culture. b) Germinating seeds and five-day old seedlings were shown to degrade DNA in the incubation medium and to ultilize these degradation products for their own DNA synthesis. Reutilization could be almost totally suppressed the addition of unlabelled thymidine as a competitor. This allowed a detection of significant amounts of residuel donor closely but transiently associated with the plant tissues. c) In soybean shoots dipped into a solution of donor DNA, partly this DNA was found to first migrate to the leaves where mostly labelled endogenous DNA was later found. Very large amounts of polymerized exogenous DNA were found in the regenerated roots after 12 days of culture. (author)

  17. Analyzing Bullwhip Effect in Supply Networks under Exogenous Uncertainty

    Directory of Open Access Journals (Sweden)

    Mitra Darvish

    2014-05-01

    Full Text Available This paper explains a model for analyzing and measuring the propagation of order amplifications (i.e. bullwhip effect for a single-product supply network topology considering exogenous uncertainty and linear and time-invariant inventory management policies for network entities. The stream of orders placed by each entity of the network is characterized assuming customer demand is ergodic. In fact, we propose an exact formula in order to measure the bullwhip effect in the addressed supply network topology considering the system in Markovian chain framework and presenting a matrix of network member relationships and relevant order sequences. The formula turns out using a mathematical method called frequency domain analysis. The major contribution of this paper is analyzing the bullwhip effect considering exogenous uncertainty in supply networks and using the Fourier transform in order to simplify the relevant calculations. We present a number of numerical examples to assess the analytical results accuracy in quantifying the bullwhip effect.

  18. Theory of endogenous and exogenous motivation in L2 migration

    Directory of Open Access Journals (Sweden)

    Kambon, Obadele Bakari

    2015-09-01

    Full Text Available Implied in theories of Second Language Acquisition (SLA is the notion that language learning is analogous to obtaining or acquiring a possession – thus the use of the term ‘acquisition.’ While this interpretation has gone relatively unchallenged in the literature, this article introduces a new analogy whereby language learning is seen as analogous to a process of permanent or semi-permanent migration towards a new socio-linguistic L2 space. As such, a theory of endogenous and exogenous motivation is delineated, entailing a dynamic interplay between internal (primarily psychological and external (primarily sociological push-pull factors. Endogenous and exogenous push-pull factors, together with various other personal factors, contribute to learner decisions to migrate towards, move away from or remain inert with regard to the target language. Further, motivation is framed in the larger theoretical context of causation.

  19. Exogenous cellulases of thermophilic micromycetes. Pt. 1. Selection of producers

    Energy Technology Data Exchange (ETDEWEB)

    Kvesitadze, G; Kvachadze, L; Aleksidze, T; Chartishvili, D K

    1986-01-01

    More than 600 micromycetes - representatives of different genera have been investigated for their ability to produce exogenous cellulases. Most of the investigated cultures were found to produce these enzymes, 24 cultures being thermophilic, and 18 thermotolerant. Cellulase or its derivatives proved to be the most favourable carbon source for cellulase secretion. None of the thermophilic cultures studied manifested the ability of exogenous exoglucanase biosynthesis. Using UV-rays as mutagen, a mutant strain A. terreus T-49 has been obtained being characterized by an increased endo-glucanase and cellobiase activity, as compared to the initial strains. The cellulase preparations of thermophilic micromycetes contain one cellulasic component: endo-glucanase, or two: endo-glucanase and cellobiase.

  20. Exogenous and endogenous shifts of attention in perihand space.

    Science.gov (United States)

    Le Bigot, Nathalie; Grosjean, Marc

    2016-07-01

    While some studies have found that attentional orienting is altered in perihand space, most have not. One reason for such discrepancies may be related to the types of cues (uninformative and informative) that have been used, as they are known to induce different types of shifts of attention (exogenous and endogenous, respectively). To systematically address this question, two experiments were performed in which an uninformative peripheral cue (Experiment 1) or an informative central cue (Experiment 2) preceded a peripheral target with a short (100-150 ms) stimulus-onset asynchrony. Participants performed the task with their left hand, right hand, both hands, or no hands near the display. Cueing effects were obtained in both experiments, but they were only modulated by hand position in Experiment 1, with larger effects observed in the right- and both-hand conditions. These findings suggest that exogenous attention shifts are affected by hand proximity, while endogenous shifts are not.

  1. Differentiation of stem cells upon deprivation of exogenous FGF2

    DEFF Research Database (Denmark)

    Kjartansdóttir, Kristín Rós; Gabrielsen, Anette; Reda, Ahmed

    2012-01-01

    Establishing a model for in vitro differentiation of human embryonic stem cells (hESCs) towards the germ cell lineage could be used to identify molecular mechanisms behind germ cell differentiation that may help in understanding human infertility. Here, we evaluate whether a lack of exogenous...... fibroblast growth factor 2 (FGF2) is supporting spontaneous differentiation of hESCs cultured on human foreskin fibroblast (hFF) monolayers towards germ cell lineage. Additionally to depriving the hESCs of exogenous FGF2, cells were stimulated with all-trans retinoic acid (ATRA). To get a more comprehensive...... impression on effects of removal of FGF2 and stimulation with ATRA, we combined the results of three cell lines for each experimental setting. When combining gene expression profiles of three cell lines for 96 genes, only 6 genes showed a significant up-regulation in all cell lines, when no FGF2 was added...

  2. Static magnetic field reduced exogenous oligonucleotide uptake by spermatozoa using magnetic nanoparticle gene delivery system

    International Nuclear Information System (INIS)

    Katebi, Samira; Esmaeili, Abolghasem; Ghaedi, Kamran

    2016-01-01

    Spermatozoa could introduce exogenous oligonucleotides of interest to the oocyte. The most important reason of low efficiency of sperm mediated gene transfer (SMGT) is low uptake of exogenous DNA by spermatozoa. The aim of this study was to evaluate the effects of static magnetic field on exogenous oligonucleotide uptake of spermatozoa using magnetofection method. Magnetic nanoparticles (MNPs) associated with the labeled oligonucleotides were used to increase the efficiency of exogenous oligonucleotide uptake by rooster spermatozoa. We used high-field/high-gradient magnet (NdFeB) to enhance and accelerate exogenous DNA sedimentation at the spermatozoa surface. Flow cytometry analysis was performed to measure viability and percentage of exogenous oligonucleotide uptake by sperm. Flow cytometry analysis showed a significant increase in exogenous oligonucleotide uptake by rooster spermatozoa (P<0.001) when spermatozoa were incubated in exogenous oligonucleotide solution and MNPs. However, by applying static magnetic field during magnetofection method, a significant decrease in exogenous oligonucleotide uptake was observed (P<0.05). Findings of this study showed that MNPs were effective to increase exogenous oligonucleotide uptake by rooster spermatozoa; however unlike others studies, static magnetic field, was not only ineffective to enhance exogenous oligonucleotide uptake by rooster spermatozoa but also led to reduction in efficiency of magnetic nanoparticles in gene transfer. - Highlights: • Core/shell type Iron oxide nanoparticles were used as a novel and efficient method. • This method increases exogenous DNA uptake by rooster spermatozoa. • Static magnetic field decreased DNA uptake by rooster spermatozoa.

  3. Static magnetic field reduced exogenous oligonucleotide uptake by spermatozoa using magnetic nanoparticle gene delivery system

    Energy Technology Data Exchange (ETDEWEB)

    Katebi, Samira; Esmaeili, Abolghasem, E-mail: aesmaeili@sci.ui.ac.ir; Ghaedi, Kamran

    2016-03-15

    Spermatozoa could introduce exogenous oligonucleotides of interest to the oocyte. The most important reason of low efficiency of sperm mediated gene transfer (SMGT) is low uptake of exogenous DNA by spermatozoa. The aim of this study was to evaluate the effects of static magnetic field on exogenous oligonucleotide uptake of spermatozoa using magnetofection method. Magnetic nanoparticles (MNPs) associated with the labeled oligonucleotides were used to increase the efficiency of exogenous oligonucleotide uptake by rooster spermatozoa. We used high-field/high-gradient magnet (NdFeB) to enhance and accelerate exogenous DNA sedimentation at the spermatozoa surface. Flow cytometry analysis was performed to measure viability and percentage of exogenous oligonucleotide uptake by sperm. Flow cytometry analysis showed a significant increase in exogenous oligonucleotide uptake by rooster spermatozoa (P<0.001) when spermatozoa were incubated in exogenous oligonucleotide solution and MNPs. However, by applying static magnetic field during magnetofection method, a significant decrease in exogenous oligonucleotide uptake was observed (P<0.05). Findings of this study showed that MNPs were effective to increase exogenous oligonucleotide uptake by rooster spermatozoa; however unlike others studies, static magnetic field, was not only ineffective to enhance exogenous oligonucleotide uptake by rooster spermatozoa but also led to reduction in efficiency of magnetic nanoparticles in gene transfer. - Highlights: • Core/shell type Iron oxide nanoparticles were used as a novel and efficient method. • This method increases exogenous DNA uptake by rooster spermatozoa. • Static magnetic field decreased DNA uptake by rooster spermatozoa.

  4. Function of endothelium at adolescents with constitutional exogenous obesity before and after rehabilitation

    OpenAIRE

    Miroshnichenko, O.

    2011-01-01

    Function of endothelium at 43 adolescents with constitutional exogenous obesity before rehabilitation and at 33 healthy adolescents has been studied. Disorder of endothelial function has been established in 32 (74.4%) adolescents with constitutional exogenous obesity and in 7 (21.2%) healthy adolescents. We showed the efficiency of the rehabilitation program on restoration of endothelial function at adolescents with constitutional exogenous obesity.

  5. Speculative prototypes and exogenous ethnographies: Experiencing relationships beyond the human

    DEFF Research Database (Denmark)

    Jönsson, Li; Ulv Lenskjold, Tau

    2017-01-01

    This article deals with the role that speculative design prototypes have as means to intervene in contexts of everyday life in order to explore, and possibly facilitate, new types of relationships between human and non-human beings. Focusing on an off-centered design of the human, it seeks to exp...... to explore what types of new possibilities may arise when speculation in design meets the practice of doing what might be termed an "exogenous ethnography"....

  6. Computational analysis for biodegradation of exogenously depolymerizable polymer

    Science.gov (United States)

    Watanabe, M.; Kawai, F.

    2018-03-01

    This study shows that microbial growth and decay in a biodegradation process of exogenously depolymerizable polymer are controlled by consumption of monomer units. Experimental outcomes for residual polymer were incorporated in inverse analysis for a degradation rate. The Gauss-Newton method was applied to an inverse problem for two parameter values associated with the microbial population. A biodegradation process of polyethylene glycol was analyzed numerically, and numerical outcomes were obtained.

  7. An interpretable LSTM neural network for autoregressive exogenous model

    OpenAIRE

    Guo, Tian; Lin, Tao; Lu, Yao

    2018-01-01

    In this paper, we propose an interpretable LSTM recurrent neural network, i.e., multi-variable LSTM for time series with exogenous variables. Currently, widely used attention mechanism in recurrent neural networks mostly focuses on the temporal aspect of data and falls short of characterizing variable importance. To this end, our multi-variable LSTM equipped with tensorized hidden states is developed to learn variable specific representations, which give rise to both temporal and variable lev...

  8. Managers with and without Style: Evidence Using Exogenous Variation

    OpenAIRE

    C. Edward Fee; Charles J. Hadlock; Joshua R. Pierce

    2013-01-01

    In a large panel of Compustat firms, we find that firm policy changes after exogenous CEO departures do not display abnormally high levels of variability, casting doubt on the presence of idiosyncratic-style effects in policy choices. After endogenous CEO departures, we do detect abnormally large policy changes. These changes are larger when the firm is likely to draw from a deeper pool of replacement CEO candidates, suggesting the presence of causal-style effects that are anticipated by the ...

  9. Functional Forms, Exogenous Shifts, and Economic Surplus Changes

    OpenAIRE

    Xueyan Zhao; John D. Mullen; Gary R. Griffith

    1997-01-01

    Conditions for exact welfare measures in equilibrium displacement modeling are examined. These relate to the functional form of supply and demand, the nature of the exogenous shift, and the definition of percentage changes. Approximation errors when these conditions are not met in empirical applications are investigated and analytical expressions for the errors derived. Significant errors are possible when a proportional shift is assumed. The assumptions underlying Alston and Wohlgenant's emp...

  10. Measuring Concentration in Data with an Exogenous Order

    OpenAIRE

    Abedieh, Jasmin; Groll, Andreas; Eugster, Manuel J. A.

    2013-01-01

    Concentration measures order the statistical units under observation according to their market share. However, there are situations where an order according to an exogenous variable is more appropriate or even required. The present article introduces a generalized definition of market concentration and defines a corresponding concentration measure. It is shown that this generalized concept of market concentration satisfies the common axioms of (classical) concentration measures. In an appl...

  11. Peer Effects in Exogenously Formed University Student Groups

    OpenAIRE

    Gregory Androushchak; Oleg Poldin; Maria Yudkevich

    2012-01-01

    We estimate the influence of classmates’ ability characteristics on student achievement in exogenously formed student groups. The study uses administrative data on undergraduate students at a large selective university in Russia. The presence of high-ability classmates has a positive effect on individual academic performance, and students at the top of the ability distribution derive the greatest benefit from their presence. An increase in the proportion of less able students has an insignifi...

  12. Expression and analysis of exogenous proteins in epidermal cells.

    Science.gov (United States)

    Dagnino, Lina; Ho, Ernest; Chang, Wing Y

    2010-01-01

    In this chapter we review protocols for transient transfection of primary keratinocytes. The ability to transfect primary epidermal cells regardless of their differentiation status allows the biochemical and molecular characterization of multiple proteins. We review methods to analyze exogenous protein abundance in transfected keratinocytes by immunoblot and immunoprecipitation. We also present protocols to determine the subcellular distribution of these proteins by indirect immunofluorescence microscopy approaches.

  13. Control of exogenous factors affecting plasma homovanillic acid concentration.

    Science.gov (United States)

    Davidson, M; Giordani, A B; Mohs, R C; Mykytyn, V V; Platt, S; Aryan, Z S; Davis, K L

    1987-04-01

    Measurements of plasma homovanillic acid (pHVA) concentrations appear to be a valid research strategy in psychiatric disorders in which a central dopamine (DA) abnormality has been implicated. This study provides guidance about the control of some of the exogenous factors affecting pHVA concentrations. Fasting for 14 hours eliminates the dietary effects on pHVA in healthy human subjects. Changing position, walking for 30 minutes, or smoking two cigarettes has no effect on pHVA concentrations.

  14. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  15. In vivo micronucleus test as a biomarker of genotoxicity in free-range goats from suspected contaminated environment

    Directory of Open Access Journals (Sweden)

    Afusat Jagun Jubril

    2017-09-01

    Conclusion: The finding indicates the prevalence and frequency of micronucleus as a biomarker of genotoxicity and an indicator of exposure to environmental genotoxic subtances. Hence, this highlights the relevance of these goats as important sentinel animal model. These findings, therefore, serve as a preliminary data for further studies on the latent genotoxic environmental contaminants and their potential deleterious impact. [J Adv Vet Anim Res 2017; 4(3.000: 281-287

  16. [Exogenous Sr2+ sedimentation on otolith of chum salmon embryos].

    Science.gov (United States)

    Wang, Chen; Liu, Wei; Zhan, Pei-rong; Wang, Ji-long; Li, Pei-lun

    2015-10-01

    To explore the exogenous Sr2+ sedimentation on otolith of chum salmon embryos, chum salmon embryos were exposed to culture water contained Sr2+ at Sr2+ concentration of 50, 100, 200 or 400 mg . L-1 for 48 h to imitate Sr2+ sedimentation. After a culturing period of 12 d and 100 d, the otoliths of the chum salmon were taken to detect exogenous Sr2+ sedimentation with electro-probe microanalyzer (EPMA). The results showed that obvious deep red strontium signatures were produced in the otolith of chum salmon at different concentrations of Sr2+. The mean and extreme values of peak strontium area were not stable for the same Sr2+ dose, but the lowest of all the peak values was 35.1 times as much as that of control. Overall, the strontium value increased with the increase of Sr2+concentration. The strontium peak had no signs of abating after a culture period of 100 d. The results also showed that strontium was gradually deposited in the otolith, and had obvious hysteresis to immersion. Strontium sedimentation could also return to a normal level after the peak. These characteristics accorded exactly with the requirement of discharge tag technology, which indicated that exogenous Sr2+ was suitable in the marking of salmon otolith.

  17. Exogenous lipoid pneumonia: high-resolution CT findings

    International Nuclear Information System (INIS)

    Lee, J.S.; Song, K.S.; Lim, T.H.; Im, J.G.; Seo, J.B.

    1999-01-01

    The aim of this study was to assess high-resolution computed tomography (HRCT) findings of exogenous lipoid pneumonia. High-resolution computed tomography was obtained in 25 patients with proven exogenous lipoid pneumonia resulting from aspiration of squalene (derived from shark liver oil). Diagnosis was based on biopsy (n = 9), bronchoalveolar lavage (n = 8), or sputum cytology and clinical findings (n = 8). The clinical history of taking squalene was confirmed in all patients. The CT findings were classified into three patterns: diffuse ground-glass opacity, consolidation, and interstitial abnormalities. Distribution of the abnormalities, duration of taking squalene, predisposing factors for aspiration, and route of administration were analyzed. Ten patients showed diffuse ground-glass opacity pattern. Seven of 10 patients had predisposing conditions such as unconsciousness, pharyngeal dysmotility, or motor disturbances, and 6 patients had a recent history of taking large amount of squalene through nasal route. Seven patients who had consolidation pattern had a history of taking squalene for several months and did not have any predisposing factor. All of the 5 patients who had a pattern of interstitial abnormalities had a history of taking squalene longer than 1 year and showed segmental distribution of interstitial thickening with interposing ground-glass opacities. Three patients simultaneously had two different patterns at different lobes of the lung. The HRCT findings of lipoid pneumonia are ground-glass opacities, consolidation, and interstitial abnormalities. These HRCT findings with appropriate inquiries could be useful for diagnosis of exogeneous lipoid pneumonia. (orig.)

  18. Glucocorticoid-related bone changes from endogenous or exogenous glucocorticoids.

    Science.gov (United States)

    Warriner, Amy H; Saag, Kenneth G

    2013-12-01

    Glucocorticoids have a negative impact on bone through direct effects on bone cells and indirect effects on calcium absorption. Here, recent findings regarding glucocorticoid-induced osteoporosis, bone changes in patients with endogenous glucocorticoid derangements, and treatment of steroid-induced bone disease are reviewed. Although the majority of our understanding arises from the outcomes of patients treated with exogenous steroids, endogenous overproduction appears to be similarly destructive to bone, but these effects are reversible with cure of the underlying disease process. Additionally, there are bone changes that occur in diseases that interrupt adrenal glucocorticoid production, both in response to our inability to perfectly match glucocorticoid replacement and also related to the underlying disease process. More investigation is required to understand which patients with endogenous overproduction or underproduction of glucocorticoid would benefit from osteoporosis treatment. Better understood is the benefit that can be achieved with currently approved treatments for glucocorticoid-induced osteoporosis from exogenous steroids. With growing concern of long-term use of bisphosphonates, however, further investigation into the duration of use and use in certain populations, such as children and premenopausal women, is essential. Glucocorticoid-induced osteoporosis is a complex disease that is becoming better understood through advances in the study of exogenous and endogenous glucocorticoid exposure. Further advancement of proper treatment and prevention is on the horizon.

  19. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  20. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  1. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  2. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  3. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  4. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  6. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  7. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  8. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  9. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  10. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  11. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  12. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  13. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  14. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  15. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  17. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  18. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  20. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  1. Cytotoxic, mutagenicity, and genotoxicity effects of guanylhydrazone derivatives.

    Science.gov (United States)

    Pinhatti, Valéria Rodrigues; da Silva, Juliana; Martins, Tales Leandro Costa; Moura, Dinara Jaqueline; Rosa, Renato Moreira; Villela, Izabel; Stopiglia, Cheila Denise Ottonelli; da Silva Santos, Selma; Scroferneker, Maria Lúcia; Machado, Carlos Renato; Saffi, Jenifer; Henriques, João Antonio Pêgas

    2016-08-01

    Several studies have reported that guanylhydrazones display a variety of desirable biological properties, such as antihypertensive, antibacterial, and antimalarial behaviour. They furthermore promote anti-pneumocystosis and anti-trypanosomiasis, exhibit antitumor activity, and show significant cytotoxicity against cancer cell lines. In this work, we have evaluated the cytotoxicity, mutagenicity, and genotoxicity of two guanylhydrazones derivatives, (E)-2-[(2,3-dimethoxyphenyl) methylene] hydrazine carboxymidamide hydrochloride (2,3-DMeB) and (E)-2-[(3,4-dimethoxyphenyl) methylene] hydrazine carboxymidamide hydrochloride (3,4-DMeB), in different biological models. Both 2,3-DMeB and 3,4-DMeB induce weak cytotoxic and mutagenic effects in bacteria and yeast. The genotoxicity of these compounds was determined in a fibroblast cell line (V79) using alkaline comet assay, as well as a modified comet assay with bacterial enzymes formamidopyrimidine DNA-glycosylase (FPG) and endonuclease III (EndoIII). Both guanylhydrazone derivatives induced DNA damage. Treatment of V79 cells with EndoIII and FPG proteins demonstrated a significant effect of 2,3-DMeB and 3,4-DMeB with respect to oxidized bases. In addition, the derivatives induced a significant increase in the frequency of micronucleated cells at high doses. The antifungal and anti-trypanosomal properties of these guanylhydrazone derivatives were also evaluated, and the obtained results suggest that 2,3-DMeB is more effective than 3,4-DMeB. The biological activity of 2,3-DMeB and 3,4-DMeB may thus be related, at least in part, to their oxidative potential, as well as to their ability to interact with DNA. Considering the previously reported in vitro antitumor activity of guanylhydrazone derivatives in combination with the lack of acute toxicity and the fact that DNA damage is only observed at high doses should render both compounds good candidates for in vivo studies on antitumor activity. Copyright © 2016 Elsevier B

  2. Genotoxic, epigenetic, and transcriptomic effects of tamoxifen in mouse liver

    International Nuclear Information System (INIS)

    Conti, Aline de; Tryndyak, Volodymyr; Churchwell, Mona I.; Melnyk, Stepan; Latendresse, John R.; Muskhelishvili, Levan; Beland, Frederick A.; Pogribny, Igor P.

    2014-01-01

    Highlights: • Treatment of female mice with tamoxifen caused genotoxic changes in the livers. • Tamoxifen treatment did not affect the hepatic epigenome. • Tamoxifen caused over-expression of hepatic Lcn13 and Pparγ genes. • Mice are resistant to tamoxifen-induced liver carcinogenesis and fatty liver injury. - Abstract: Tamoxifen is a non-steroidal anti-estrogenic drug widely used for the treatment and prevention of breast cancer in women; however, there is evidence that tamoxifen is hepatocarcinogenic in rats, but not in mice. Additionally, it has been reported that tamoxifen may cause non-alcoholic fatty liver disease (NAFLD) in humans and experimental animals. The goals of the present study were to (i) investigate the mechanisms of the resistance of mice to tamoxifen-induced hepatocarcinogenesis, and (ii) clarify effects of tamoxifen on NAFLD-associated liver injury. Feeding female WSB/EiJ mice a 420 p.p.m. tamoxifen-containing diet for 12 weeks resulted in an accumulation of tamoxifen-DNA adducts, (E)-α-(deoxyguanosin-N 2 -yl)-tamoxifen (dG-TAM) and (E)-α-(deoxyguanosin-N 2 -yl)-N-desmethyltamoxifen (dG-DesMeTAM), in the livers. The levels of hepatic dG-TAM and dG-DesMeTAM DNA adducts in tamoxifen-treated mice were 578 and 340 adducts/108 nucleotides, respectively, while the extent of global DNA and repetitive elements methylation and histone modifications did not differ from the values in control mice. Additionally, there was no biochemical or histopathological evidence of NAFLD-associated liver injury in mice treated with tamoxifen. A transcriptomic analysis of differentially expressed genes demonstrated that tamoxifen caused predominantly down-regulation of hepatic lipid metabolism genes accompanied by a distinct over-expression of the lipocalin 13 (Lcn13) and peroxisome proliferator receptor gamma (Pparγ), which may prevent the development of NAFLD. The results of the present study demonstrate that the resistance of mice to tamoxifen

  3. Genotoxicity assessment of ethylenediamine dinitrate (EDDN) and diethylenetriamine trinitrate (DETN).

    Science.gov (United States)

    Reddy, Gunda; Song, Jian; Kirby, Paul; Johnson, Mark S

    2011-12-24

    Ethylenediamine dinitrate (EDDN) and diethylenetriamine trinitrate (DETN) are relatively insensitive explosive compounds that are being explored as safe alternatives to other more sensitive compounds. When used in combination with other high explosives they are an improvement and may provide additional safety during storage and use. The genetic toxicity of these compounds was evaluated to predict the potential adverse human health effects from exposure by using a standard genetic toxicity test battery which included: a gene mutation test in bacteria (Ames), an in vitro Chinese Hamster Ovary (CHO) cell chromosome aberration test and an in vivo mouse micronucleus test. The results of the Ames test showed that EDDN increased the mean number of revertants per plate with strain TA100, without activation, at 5000μg/plate compared to the solvent control, which indicated a positive result. No positive results were observed with the other tester strains with or without activation in Salmonella typhimurium strains TA98, TA1535, TA1537, and Escherichia coli strain WP2 uvrA. DETN was negative for all Salmonella tester strains and E. coli up to 5000μg/plate both with and without metabolic activation. The CHO cell chromosome aberration assay was performed using EDDN and DETN at concentrations up to 5000μg/mL. The results indicate that these compounds did not induce structural chromosomal aberrations at all tested concentrations in CHO cells, with or without metabolic activation. EDDN and DETN, when tested in vivo in the CD-1 mouse at doses up to 2000mg/kg, did not induce any significant increase in the number of micronuclei in bone marrow erythrocytes. These studies demonstrate that EDDN is mutagenic in one strain of Salmonella (TA100) but was negative in other strains, for in vitro induction of chromosomal aberrations in CHO cells, and for micronuclei in the in vivo mouse micronucleus assay. DETN was not genotoxic in all in vitro and in vivo tests. These results show the in

  4. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  5. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  6. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  7. Exogenous activated NK cells enhance trafficking of endogenous NK cells to endometriotic lesions.

    Science.gov (United States)

    Montenegro, Mary Lourdes; Ferriani, Rui Alberto; Basse, Per H

    2015-08-29

    Endometriosis is defined as the presence of endometrial glands and stroma at ectopic locations. Although the prevalence of endometriosis is as high as 35%-50%, its pathogenesis remains controversial. An increasing number of studies suggest that changes in immune reactivity may be primarily involved in the development of endometriosis development. In this sense, it has been strongly suggested that a fundamental part of immunologic system, the natural killer cells (NK cells), are an important part of this process. NK cells, a component of the innate immune system, have been extensively studied for their ability to defend the organism against infections and malignancy. Recent studies have shown that IL-2-activated NK (A-NK) cells are able to attack and destroy tumors in lungs and livers of mice, demonstrating the therapeutic potential of these cells. Similarly to metastatic tumor cells, endometrial cells are able to adhere, infiltrate and proliferate at ectopic locations. Therefore, in this study, we evaluated the ability of adoptively transferred and endogenous NK cells to infiltrate endometriosis lesions. As NK cells donors were used C57BL/6 B6. PL- Thy 1.1 female mice. As uterine horns donors were used C57/BL6+GFP female mice and as endometriosis recipients C57BL/6 Thy1.2 female mice. Endometriosis induction was made by injection of endometrial tissue fragments. After 4 weeks, necessary for endometriosis lesions establishment the animals were divided in 3 experimental groups with 10 animals each. Group 1 received i.v doses of 5x106 A-NK in 200μl RPMI; Group 2 received i.p dose of 5x106 A-NK in 200μl RPMI and Group 3 received i.p dose of IL2 (0.5 mL RPMI containing 5.000U of IL2). Our data show that exogenous A-NK cells injected via ip combined with endogenous A-NK cells seems to be the most efficient way for activated NK cells track and infiltrate endometriosis. For the first time, it was shown that both endogenous as exogenous A-NK cells are able to track

  8. Genotoxicity of antiobesity drug orlistat and effect of caffeine intervention: an in vitro study.

    Science.gov (United States)

    Chakrabarti, Manoswini; Ghosh, Ilika; Jana, Aditi; Ghosh, Manosij; Mukherjee, Anita

    2017-07-01

    Obesity is a major global health problem associated with various adverse effects. Pharmacological interventions are often necessary for the management of obesity. Orlistat is an FDA-approved antiobesity drug which is a potent inhibitor of intestinal lipases. In the current study, orlistat was evaluated for its genotoxic potential in human lymphocyte cells in vitro and was compared with that of another antiobesity drug sibutramine, presently withdrawn from market due its undesirable health effects. Caffeine intake may be an additional burden in people using anorectic drugs, therefore, further work is needed to be carried out to evaluate the possible effects of caffeine on orlistat-induced DNA damage. Human lymphocytes were exposed to orlistat (250, 500 and 1000 μg/ml), sibutramine (250, 500 and 1000 μg/ml) and caffeine (25, 50, 75, 100, 125 and 150 μg/ml) to assess their genotoxicity by comet assay in vitro. In addition, lymphocytes were co-incubated with caffeine (50, 75 and 100 μg/ml) and a single concentration of orlistat (250 μg/ml). Orlistat and sibutramine were genotoxic at all concentrations tested, sibutramine being more genotoxic. Caffeine was found to be genotoxic at concentrations 125 μg/ml and above. Co-treatment of orlistat with non-genotoxic concentrations (50, 75 and 100 μg/ml) of caffeine lead to a decrease in DNA damage. Orlistat can induce DNA damage in human lymphocytes in vitro and caffeine was found to reduce orlistat-induced genotoxicity.

  9. The cytotoxicity and genotoxicity of soluble and particulate cobalt in human lung fibroblast cells

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Leah J.; Holmes, Amie L. [Wise Laboratory of Environmental and Genetic Toxicology, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Maine Center for Environmental Toxicology and Health, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Department of Applied Medical Science, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Kandpal, Sanjeev Kumar; Mason, Michael D. [Department of Chemical and Biological Engineering, University of Maine, Orono, ME (United States); Zheng, Tongzhang [Department of Environmental Health Sciences, Yale School of Public Health, New Haven, CT (United States); Wise, John Pierce, E-mail: John.Wise@usm.maine.edu [Wise Laboratory of Environmental and Genetic Toxicology, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Maine Center for Environmental Toxicology and Health, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Department of Applied Medical Science, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States)

    2014-08-01

    Cobalt exposure is increasing as cobalt demand rises worldwide due to its use in enhancing rechargeable battery efficiency, super-alloys, and magnetic products. Cobalt is considered a possible human carcinogen with the lung being a primary target. However, few studies have considered cobalt-induced toxicity in human lung cells. Therefore, in this study, we sought to determine the cytotoxicity and genotoxicity of particulate and soluble cobalt in human lung cells. Cobalt oxide and cobalt chloride were used as representative particulate and soluble cobalt compounds, respectively. Exposure to both particulate and soluble cobalt induced a concentration-dependent increase in cytotoxicity, genotoxicity, and intracellular cobalt ion levels. Based on intracellular cobalt ion levels, we found that soluble cobalt was more cytotoxic than particulate cobalt while particulate and soluble cobalt induced similar levels of genotoxicity. However, soluble cobalt induced cell cycle arrest indicated by the lack of metaphases at much lower intracellular cobalt concentrations compared to cobalt oxide. Accordingly, we investigated the role of particle internalization in cobalt oxide-induced toxicity and found that particle-cell contact was necessary to induce cytotoxicity and genotoxicity after cobalt exposure. These data indicate that cobalt compounds are cytotoxic and genotoxic to human lung fibroblasts, and solubility plays a key role in cobalt-induced lung toxicity. - Highlights: • Particulate and soluble cobalt are cytotoxic and genotoxic to human lung cells. • Soluble cobalt induces more cytotoxicity compared to particulate cobalt. • Soluble and particulate cobalt induce similar levels of genotoxicity. • Particle-cell contact is required for particulate cobalt-induced toxicity.

  10. A whole-cell bioreporter assay for quantitative genotoxicity evaluation of environmental samples.

    Science.gov (United States)

    Jiang, Bo; Li, Guanghe; Xing, Yi; Zhang, Dayi; Jia, Jianli; Cui, Zhisong; Luan, Xiao; Tang, Hui

    2017-10-01

    Whole-cell bioreporters have emerged as promising tools for genotoxicity evaluation, due to their rapidity, cost-effectiveness, sensitivity and selectivity. In this study, a method for detecting genotoxicity in environmental samples was developed using the bioluminescent whole-cell bioreporter Escherichia coli recA::luxCDABE. To further test its performance in a real world scenario, the E. coli bioreporter was applied in two cases: i) soil samples collected from chromium(VI) contaminated sites; ii) crude oil contaminated seawater collected after the Jiaozhou Bay oil spill which occurred in 2013. The chromium(VI) contaminated soils were pretreated by water extraction, and directly exposed to the bioreporter in two phases: aqueous soil extraction (water phase) and soil supernatant (solid phase). The results indicated that both extractable and soil particle fixed chromium(VI) were bioavailable to the bioreporter, and the solid-phase contact bioreporter assay provided a more precise evaluation of soil genotoxicity. For crude oil contaminated seawater, the response of the bioreporter clearly illustrated the spatial and time change in genotoxicity surrounding the spill site, suggesting that the crude oil degradation process decreased the genotoxic risk to ecosystem. In addition, the performance of the bioreporter was simulated by a modified cross-regulation gene expression model, which quantitatively described the DNA damage response of the E. coli bioreporter. Accordingly, the bioluminescent response of the bioreporter was calculated as the mitomycin C equivalent, enabling quantitative comparison of genotoxicities between different environmental samples. This bioreporter assay provides a rapid and sensitive screening tool for direct genotoxicity assessment of environmental samples. Copyright © 2017. Published by Elsevier Ltd.

  11. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Bacterial reduction in genotoxicity of Direct Red 28 dye.

    Science.gov (United States)

    Bafana, Amit; Jain, Minakshi; Agrawal, Gaurav; Chakrabarti, Tapan

    2009-03-01

    Direct Red 28 (DR28) is a benzidine-based azo dye widely used in several countries. It has also been a subject of intense research for its anti-prion activity. Like other benzidine-based azo dyes, it is also carcinogenic and toxic. However, there are very few studies addressing its detoxification. In the present study, a Bacillus velezensis strain was used for detoxification of DR28. Toxicity was checked by a battery of highly sensitive genotoxicity assays like comet assay, DNA ladder formation, terminal deoxynucleotidyl transferase-mediated dUTP nick-end labeling assay and flow cytometric Annexin V binding assay. HL-60 cell line was used as the test system. All the assays showed an initial increase in toxicity upon biodegradation due to release of mutagenic products, like benzidine and 4-aminobiphenyl, from the dye. These intermediates caused significant DNA damage and induced apoptosis in HL-60 cells. Then the culture degraded these mutagenic intermediates, due to which the toxicity was reduced gradually, finally resulting in nearly complete detoxification.

  16. Current methods in risk assessment of genotoxic chemicals.

    Science.gov (United States)

    Cartus, Alexander; Schrenk, Dieter

    2017-08-01

    Chemical contaminants and residues are undesired chemicals occurring in consumer products such as food and drugs, at the workplace and in the environment, i.e. in air, soil and water. These compounds can be detected even at very low concentrations and lead frequently to considerable concerns among consumers and in the media. Thus it is a major challenge for modern toxicology to provide transparent and versatile tools for the risk assessment of such compounds in particular with respect to human health. Well-known examples of toxic contaminants are dioxins or mercury (in the environment), mycotoxins (from infections by molds) or acrylamide (from thermal treatment of food). The process of toxicological risk assessment of such chemicals is based on i) the knowledge of their contents in food, air, water etc., ii) the routes and extent of exposure of humans, iii) the toxicological properties of the compound, and, iv) its mode(s) of action. In this process quantitative dose-response relationships, usually in experimental animals, are of outstanding importance. For a successful risk assessment, in particular of genotoxic chemicals, several conditions and models such as the Margin of Exposure (MoE) approach or the Threshold of Toxicological Concern (TTC) concept exist, which will be discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Nano-QSAR: Genotoxicity of Multi-Walled Carbon Nanotubes

    International Nuclear Information System (INIS)

    Toropova, A. P.; Toropov, A. A.; Rallo, R.; Leszczynska, D.; Leszczynski, J.

    2016-01-01

    The study was carried out to develop an efficient approach for prediction the genotoxicity of carbon nano tubes. The experimental data on the bacterial reverse mutation test (TA100) on multi-walled carbon nano tubes was collected from the literature and examined as an endpoint. By means of the optimal descriptors calculated with the Monte Carlo method a mathematical model of the endpoint was built up. The model is represented by a function of: (i) dose (μg/plate); (ii) metabolic activation (i.e. with S9 mix or without S9 mix); and (iii) two types of multi-walled carbon nano tubes. The above listed conditions were represented by so-called quasi-SMILES. Simplified molecular input-line entry system (SMILES) is a tool for representation of molecular structure. The quasi-SMILES is a tool to represent physicochemical and / or biochemical conditions for building up a predictive model. Thus, instead of well-known paradigm of predictive modeling “endpoint is a mathematical function of molecular structure” a fresh paradigm “endpoint is a mathematical function of available eclectic data (conditions) is suggested.

  18. Sewage sludge does not induce genotoxicity and carcinogenesis

    Science.gov (United States)

    Silva, Paula Regina Pereira; Barbisan, Luis Fernando; Dagli, Maria Lúcia Zaidan; Saldiva, Paulo Hilário Nascimento

    2012-01-01

    Through a series of experiments, the genotoxic/mutagenic and carcinogenic potential of sewage sludge was assessed. Male Wistar rats were randomly assigned to four groups: Group 1 - negative control; Group 2 - liver carcinogenesis initiated by diethylnitrosamine (DEN; 200 mg/kg i.p.); Group 3 and G4-liver carcinogenesis initiated by DEN and fed 10,000 ppm or 50,000 ppm of sewage sludge. The animals were submitted to a 70% partial hepatectomy at the 3rd week. Livers were processed for routine histological analysis and immunohistochemistry, in order to detect glutathione S-transferase positive altered hepatocyte foci (GST-P+ AHF). Peripheral blood samples for the comet assay were obtained from the periorbital plexus immediately prior to sacrificing. Polychromatic erythrocytes (PCEs) were analyzed in femoral bone-marrow smears, and the frequencies of those micronucleated (MNPCEs) registered. There was no sewage-sludge-induced increase in frequency of either DNA damage in peripheral blood leucocytes, or MNPCEs in the femoral bone marrow. Also, there was no increase in the levels of DNA damage, in the frequency of MNPCEs, and in the development of GST-P AHF when compared with the respective control group. PMID:23055806

  19. Metabolism and genotoxicity of aromatic amines in aquatic organisms

    International Nuclear Information System (INIS)

    Knezovich, J.P.; Krauter, P.W.; Lawton, M.P.; Harrison, F.L.

    1987-01-01

    Marine mussels (Mytilus edulis) and bullfrog tadpoles (Rana catesbeiana) were used to investigate the comparative metabolism and genotoxicity of aromatic amines in vivo. These organisms were selected because they possess distinctly different metabolic capabilities: mussels lack an active mixed-function-oxidase enzyme system that is present in most other organisms, including amphibians. Using 14 C-labeled chemical probes (o- and p-toluidine, 2-aminofluorene (2-AF), and 2-acetylaminofluorene (2-AAF)), mussels and tadpoles well dosed with individual compounds by direct immersion in aqueous solutions. The identities of metabolites were then determined by HPLC and GC/MS methods. Results indicate that the N-conjugating pathways used by mussels result primarily in the detoxification of aromatic amines by limiting the amount of primary amine available for activation. The tadpoles excreted a number of 2-AAF metabolites but did form DNA and protein adducts in the liver. Induction of micronuclei in the peripheral red blood cells was also demonstrated. The tadpole was shown to be a sensitive biological indicator of pollution in aquatic ecosystems

  20. Cytotoxic and genotoxic effects of silver nanoparticles in testicular cells

    International Nuclear Information System (INIS)

    Asare, Nana; Instanes, Christine; Sandberg, Wiggo J.; Refsnes, Magne; Schwarze, Per; Kruszewski, Marcin; Brunborg, Gunnar

    2012-01-01

    Serious concerns have been expressed about potential risks of engineered nanoparticles. Regulatory health risk assessment of such particles has become mandatory for the safe use of nanomaterials in consumer products and medicines; including the potential effects on reproduction and fertility, are relevant for this risk evaluation. In this study, we examined effects of silver particles of nano- (20 nm) and submicron- (200 nm) size, and titanium dioxide nanoparticles (TiO 2 -NPs; 21 nm), with emphasis on reproductive cellular- and genotoxicity. Ntera2 (NT2, human testicular embryonic carcinoma cell line), and primary testicular cells from C57BL6 mice of wild type (WT) and 8-oxoguanine DNA glycosylase knock-out (KO, mOgg1 −/− ) genotype were exposed to the particles. The latter mimics the repair status of human testicular cells vs oxidative damage and is thus a suitable model for human male reproductive toxicity studies. The results suggest that silver nano- and submicron-particles (AgNPs) are more cytotoxic and cytostatic compared to TiO 2 -NPs, causing apoptosis, necrosis and decreased proliferation in a concentration- and time-dependent manner. The 200 nm AgNPs in particular appeared to cause a concentration-dependent increase in DNA-strand breaks in NT2 cells, whereas the latter response did not seem to occur with respect to oxidative purine base damage analysed with any of the particles tested.

  1. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  2. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  3. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  4. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  5. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  6. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  7. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  8. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  9. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  10. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  12. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  13. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  14. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  15. Recent perspectives on the relations between faecal mutagenicity, genotoxicity and diet

    Directory of Open Access Journals (Sweden)

    Silvia eGratz

    2011-03-01

    Full Text Available DNA damage is an essential component of the genesis of colonic cancer. Gut microbial products and food components are thought to be principally responsible for the damage that initiates disease progression. Modified Ames tests and Comet assays have been developed for measuring mutagenicity and genotoxicity. Their relevance to oncogenesis remains to be confirmed, as does the relative importance of different mutagenic and genotoxic compounds present in faecal water and the bacteria involved in their metabolism. Dietary intervention studies provide clues to the likely risks of oncogenesis. High-protein diets lead to increases in N-nitroso compounds in faecal water and greater DNA damage as measured by the Comet assay, for example. Other dietary interventions, such as non-digestible carbohydrates and probiotics, may lead to lower faecal genotoxicity. In order to make recommendations to the general public, we must develop a better understanding of how genotoxic compounds are formed in the colon, how accurate the Ames and Comet assays are, and how diet affects genotoxicity.

  16. Mutagenic and genotoxic activity of particulate matter MP2,5, in Pamplona, North Santander, Colombia

    Directory of Open Access Journals (Sweden)

    Martínez Montañez, Mónica Liseth

    2012-10-01

    Full Text Available Objective: To study the mutagenic and genotoxic activities of particulate material (MP2,5 collected in Pamplona, Norte de Santander, Colombia.Materials and methods: MP2,5 was monitored by means of a Partisol 2025 sequential air sampler with Plus Palmflex quartz filters. The latter were subjected to two extraction procedures: Soxhlet extraction using dichloromethane-acetone; and ultrasonic extraction using dichloromethane, acetone and dichloromethane/ acetone mix. The mutagenic and genotoxic activities were determined for each extract.Results: This is the first study conducted in Colombia that reports the mutagenic and genotoxic activities associated with particulate matter (MP2,5 taken from vehicular emissions in Pamplona, Norte de Santander. The mutagenic assay determined by the Ames test using Salmonella typhimurium strains TA98 and TA100 showed a high direct mutagenic activity in the analyzed extracts. On the other hand, the genotoxic activity, determined by means of the comet assay, was high too.Conclusion: Particulate material (MP2,5 present in air samples in Pamplona (northeastern Colombia is a risk factor for the exposed population because it can directly induce mutations and also cause genotoxic damage.

  17. AFFINITY BIOSENSOR BASED ON SCREEN-PRINTED ELECTRODE MODIFIED WITH DNA FOR GENOTOXIC COMPOUNDS DETECTION

    Directory of Open Access Journals (Sweden)

    Bambang Kuswandi

    2010-06-01

    Full Text Available An electrochemical method for the detection of the genotoxic compounds using a DNA-modified electrode was developed. This electrode was successfully used for the electrochemical detection of genotoxic compounds in water samples. The electrochemical results clearly demonstrated that, the development is related to the molecular interaction between the surface-linked DNA obtained from calf thymus and the target compounds, such as pollutants, in order to develop a simple device for rapid screening of genotoxic compounds in environmental samples. The detection of such compounds was measured by their effect on the oxidation signal of the guanine peak of the DNA immobilised on the surface of carbon based Screen-Printed Electrode (SPE in disposable mode, and monitored by square-wave voltametric analysis. The DNA biosensor is able to detect known intercalating and groove-binding genotoxic compounds such as Dioxin, Bisphenol A, PCBs, and Phtalates. Application to real water samples is discussed and reported.   Keywords: electrochemical, screen-printed electrode, DNA biosensor, genotoxic compounds

  18. Non-genotoxic carcinogens: early effects on gap junctions, cell proliferation and apoptosis in the rat

    International Nuclear Information System (INIS)

    Mally, Angela; Chipman, James Kevin

    2002-01-01

    Non-genotoxic carcinogens are thought to induce tumour formation by disturbing the balance between cell growth and cell death. Gap junctions (GJ) contribute to the maintenance of tissue homeostasis by allowing the intercellular exchange of growth regulatory signals and potential inhibition of GJ intercellular communication through loss of connexin (Cx) plaques has been shown to be involved in the cancer process. We have investigated the time- and dose-dependent effects of the non-genotoxic hepatocarcinogens Wy-14,643, 2,3,7,8-tetrachlorodibenzo-p-dioxin, methapyrilene and hexachlorobenzene and the male rat kidney carcinogens chloroform, p-dichlorobenzene and d-limonene on gap junction plaque expression in relation to proliferation and apoptosis. With the exception of limonene, all non-genotoxic carcinogens significantly reduced the expression of GJ plaques containing Cx32 in their respective target tissue. No dose-dependent, significant effects were seen in non-target organs. Although alteration of Cx32 expression did not appear to correlate with induction of cell proliferation, out data suggest that the interaction of both processes--interference of GJ coupled with a proliferative stimulus (at the carcinogenic dose)--may be important in non-genotoxic carcinogenesis and provide a potential alert for non-genotoxic carcinogens in short-term toxicity tests

  19. Assessment of Genotoxicity of Ionizing radiation using Tradescantia-Comet assay

    Energy Technology Data Exchange (ETDEWEB)

    Han, Min; Ryu, Tae Ho; Hyun, Kyung Man; Kim, Jin Kyu [Korea Atomic Energy Research Institute, Jeongeup (Korea, Republic of); Wilhelmova, Nad [Institute of Experimental Botany, Prague (Czech Republic)

    2010-05-15

    Over the last two decades, several new methodologies for the detection of DNA damage have been developed. The comet assay is currently used in different areas of biological sciences to detect DNA damage. The comet assay, also called the single cell gel electrophoresis (SCGE) was first introduced by Ostling and Johanson as a microelectrophoretic technique for the direct visualization of DNA damage in individual cells. The comet assay, due to its simplicity, sensitivity and need of a few cells, is ideal as a short-term genotoxicity test. The comet assay can theoretically be applied to every type of eukaryotic cell, including plant cells. Plants are very useful as monitors of genetic effects caused by pollution in the atmosphere, water and soil. Although the genotoxic effects detected by Tradescantia tests cannot be associated with mutagenesis or even carcinogenesis in humans, these bioassays are very useful tools for screening the mutagenic potential in the environment. Experiments were conducted to study the genotoxic effects of ionizing radiations on the genome integrity, particularly of Tradescantia. The increasingly frequent use of Tradescantia as a sensitive environmental bioindicator of genotoxic effects. This study was designed to assess the genotoxicity of ionizing radiation using Tradescnatia-comet assay

  20. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  1. Improved control of exogenous attention in action video game players

    Directory of Open Access Journals (Sweden)

    Matthew S Cain

    2014-02-01

    Full Text Available Action video game players have demonstrated a number of attentional advantages over non-players. Here, we propose that many of those benefits might be underpinned by improved control over exogenous (i.e., stimulus-driven attention. To test this we used an anti-cuing task, in which a sudden-onset cue indicated that the target would likely appear in a separate location on the opposite side of the fixation point. When the time between the cue onset and the target onset was short (40 ms, non-players (nVGPs showed a typical exogenous attention effect. Their response times were faster to targets presented at the cued (but less probable location compared with the opposite (more probable location. Video game players (VGPs, however, were less likely to have their attention drawn to the location of the cue. When the onset asynchrony was long (600 ms, VGPs and nVGPs were equally able to endogenously shift their attention to the likely (opposite target location. In order to rule out processing-speed differences as an explanation for this result, we also tested VGPs and nVGPs on an attentional blink task. In a version of the attentional blink task that minimized demands on task switching and iconic memory, VGPs and nVGPs did not differ in second target identification performance (i.e., VGPs had the same magnitude of attentional blink as nVGPs, suggesting that the anti-cuing results were due to flexible control over exogenous attention rather than to more general speed-of-processing differences.

  2. Exogenous attention enhances 2nd-order contrast sensitivity

    Science.gov (United States)

    Barbot, Antoine; Landy, Michael S.; Carrasco, Marisa

    2011-01-01

    Natural scenes contain a rich variety of contours that the visual system extracts to segregrate the retinal image into perceptually coherent regions. Covert spatial attention helps extract contours by enhancing contrast sensitivity for 1st-order, luminance-defined patterns at attended locations, while reducing sensitivity at unattended locations, relative to neutral attention allocation. However, humans are also sensitive to 2nd-order patterns such as spatial variations of texture, which are predominant in natural scenes and cannot be detected by linear mechanisms. We assess whether and how exogenous attention—the involuntary and transient capture of spatial attention—affects the contrast sensitivity of channels sensitive to 2nd-order, texture-defined patterns. Using 2nd-order, texture-defined stimuli, we demonstrate that exogenous attention increases 2nd-order contrast sensitivity at the attended location, while decreasing it at unattended locations, relative to a neutral condition. By manipulating both 1st- and 2nd-order spatial frequency, we find that the effects of attention depend both on 2nd-order spatial frequency of the stimulus and the observer’s 2nd-order spatial resolution at the target location. At parafoveal locations, attention enhances 2nd-order contrast sensitivity to high, but not to low 2nd-order spatial frequencies; at peripheral locations attention also enhances sensitivity to low 2nd-order spatial frequencies. Control experiments rule out the possibility that these effects might be due to an increase in contrast sensitivity at the 1st-order stage of visual processing. Thus, exogenous attention affects 2nd-order contrast sensitivity at both attended and unattended locations. PMID:21356228

  3. On the spatial specificity of audiovisual crossmodal exogenous cuing effects.

    Science.gov (United States)

    Lee, Jae; Spence, Charles

    2017-06-01

    It is generally-accepted that the presentation of an auditory cue will direct an observer's spatial attention to the region of space from where it originates and therefore facilitate responses to visual targets presented there rather than from a different position within the cued hemifield. However, to date, there has been surprisingly limited evidence published in support of such within-hemifield crossmodal exogenous spatial cuing effects. Here, we report two experiments designed to investigate within- and between-hemifield spatial cuing effects in the case of audiovisual exogenous covert orienting. Auditory cues were presented from one of four frontal loudspeakers (two on either side of central fixation). There were eight possible visual target locations (one above and another below each of the loudspeakers). The auditory cues were evenly separated laterally by 30° in Experiment 1, and by 10° in Experiment 2. The potential cue and target locations were separated vertically by approximately 19° in Experiment 1, and by 4° in Experiment 2. On each trial, the participants made a speeded elevation (i.e., up vs. down) discrimination response to the visual target following the presentation of a spatially-nonpredictive auditory cue. Within-hemifield spatial cuing effects were observed only when the auditory cues were presented from the inner locations. Between-hemifield spatial cuing effects were observed in both experiments. Taken together, these results demonstrate that crossmodal exogenous shifts of spatial attention depend on the eccentricity of both the cue and target in a way that has not been made explicit by previous research. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Exogenous lipoid pneumonia: HRCT, MR, and pathologic findings

    International Nuclear Information System (INIS)

    Laurent, F.; Philippe, J.C.; Vergier, B.; Granger-Veron, B.; Darpeix, B.; Vergeret, J.; Blanc, P.; Velly, J.F.

    1999-01-01

    The objective of this study was to describe high-resolution CT (HRCT) and MR findings of exogenous lipoid pneumonia and to correlate them with pathologic findings. A retrospective review of the medical records of our institution revealed seven patients with a diagnosis of lipoid pneumonia based on clinical data, chest films, bronchoalveolar lavage, and follow-up. Both HRCT and MR imaging were reviewed by two readers. Pathologic examination of the resected specimen or surgical biopsies were also reviewed in the four available cases. The HRCT findings were pulmonary consolidations (n = 6) with fatty (n = 3) or unspecific but low attenuation values (n = 3), areas of ground-glass opacities (n = 5), septal lines, and centrilobular interstitial thickening (n = 5). In five of the seven cases, a crazy-paving pattern of various spread was also present, either isolated (n = 1) or surrounding a pulmonary consolidation. In two cases traction bronchiectasis and cystic changes consistent with fibrosis were seen. At MR imaging (n = 2) a pulmonary consolidation of high signal intensity on T1-weighted image consistent with lipid content was present in one case. Pathologic examination (n = 4) showed the coexistence of lobules with lesions of various ages, sometimes in contiguous lobules, within the same patient. Recent lesions were those with alveolar fill-in by spumous macrophages and almost normal alveolar walls and septae. In more advanced lesions, lobules were filled in with larger vacuoles often surrounded by inflammatory infiltrates of alveolar walls, bronchiolar walls, and septa. The oldest lesions were characterized by fibrosis and parenchymal distortion around large lipid-containing vacuoles. The HRCT findings reflect pathologic findings in exogenous lipoid pneumonia. Although non-specific, consolidation areas of low attenuation values and crazy-paving pattern are frequently associated in exogenous lipoid pneumonia and are indicative of the diagnosis. (orig.)

  5. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  6. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  7. Development of a universal RNA beacon for exogenous gene detection.

    Science.gov (United States)

    Guo, Yuanjian; Lu, Zhongju; Cohen, Ira Stephen; Scarlata, Suzanne

    2015-05-01

    Stem cell therapy requires a nontoxic and high-throughput method to achieve a pure cell population to prevent teratomas that can occur if even one cell in the implant has not been transformed. A promising method to detect and separate cells expressing a particular gene is RNA beacon technology. However, developing a successful, specific beacon to a particular transfected gene can take months to develop and in some cases is impossible. Here, we report on an off-the-shelf universal beacon that decreases the time and cost of applying beacon technology to select any living cell population transfected with an exogenous gene. ©AlphaMed Press.

  8. Offshoring as an Exogenous Shock to the Services Production System

    DEFF Research Database (Denmark)

    Brandl, Kristin; Mol, Michael; Petersen, Bent

    Production of services involves three key elements, an output for the client, resources of a provider and task execution. Offshoring of services acts as an exogenous shock to such a production system. Using multiple case methodology we investigate how task output, execution, and resources change...... as a consequence of offshoring and particularly how these elements are realigned. The cases reveal substantial managerial challenges in the alignment process prompted by a relocation of service task execution to an emerging economy. In particular, we find that instead of some set of capabilities that proactively...

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)