WorldWideScience

Sample records for exogenous genotoxic attack

  1. Exogenous Ochronosis

    Directory of Open Access Journals (Sweden)

    Prachi A Bhattar

    2015-01-01

    Full Text Available Exogenous ochronosis (EO is a cutaneous disorder characterized by blue-black pigmentation resulting as a complication of long-term application of skin-lightening creams containing hydroquinone but may also occur due to topical contact with phenol or resorcinol in dark-skinned individuals. It can also occur following the use of systemic antimalarials such as quinine. EO is clinically and histologically similar to its endogenous counterpart viz., alkaptonuria, which, however, exhibits systemic effects and is an inherited disorder. Dermoscopy and in vivo skin reflectance confocal microscopy are noninvasive in vivo diagnostic tools. It is very difficult to treat EO, a cosmetically disfiguring and troubling disorder with disappointing treatment options.

  2. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  3. Genotoxicity of complex mixtures: CHO cell mutagenicity assay

    Energy Technology Data Exchange (ETDEWEB)

    Frazier, M.E.; Samuel, J.E.

    1985-02-01

    A Chinese hamster ovary (CHO) mammalian cell assay was used to evaluate the genotoxicity of complex mixtures (synthetic fuels). The genotoxicity (mutagenic potency) of the mixtures increased as the temperature of their boiling range increased. Most of the genotoxicity in the 750/sup 0/F+ boiling-range materials was associated with the neutral polycyclic aromatic hydrocarbon (PAH) fractions. Chemical analysis data indicate that the PAH fractions of high-boiling coal liquids contain a number of known chemical carcinogens, including five- and six-ring polyaromatics (e.g., benzo(a)pyrene) as well as four- and five-ring alkyl-substituted PAH (e.g., methylchrysene and dimethylbenzanthracenes); concentrations are a function of boiling point (bp). In vitro genotoxicity was also detected in fractions of nitrogen-containing polyaromatic compounds, as well as in those with aliphatics of hydroxy-containing PAH. Mutagenic activity of some fractions was detectable in the CHO assay in the absence of an exogenous metabolic activation system; in some instances, addition of exogenous enzymes and cofactors inhibited expression of the direct-acting mutagenic potential of the fraction. These data indicate that the organic matrix of the chemical fraction determines whether, and to what degree, various mutagens are expressed in the CHO assay. Therefore, the results of biological assays of these mixtures must be correlated with chemical analyses for proper interpretation of these data. 29 references, 16 figures, 4 tables.

  4. Genotoxicity of swine effluents.

    Science.gov (United States)

    Techio, V H; Stolberg, J; Kunz, A; Zanin, E; Perdomo, C C

    2011-01-01

    This study aimed at the investigation of genotoxic effects of swine effluents from different stages of a treatment system for swine wastes through bioassay of stamen hairs and micronuclei in Tradescantia (clone BNL 4430). No significant differences (p≥0.05) regarding the genic mutations were found in the bioassay of stamen hairs, independently of the effluent analysed. For the genotoxicity test with micronuclei, the plants exposed to raw wastes, to sludge, and to effluent of the biodigester have presented higher rates of chromosomal damages (micronuclei), with significant differences in relation to the control group and other effluent of the waste treatment system (p≤0.05). The association between the chemical parameters and the genotoxicity data have shown that the variables COD and TKN have presented significant correlation (p≤0.05) with the number of mutagenic events in the tetrads.

  5. Genotoxic effect of alkaloids

    Directory of Open Access Journals (Sweden)

    J. A. P. Henriques

    1991-01-01

    Full Text Available Because of the increase use of alkaloids in general medical practice in recent years, it is of interest to determine genotoxic, mutagenic and recombinogenic response to different groups of alkaloids in prokaryotic and eucaryotic organisms. Reserpine, boldine and chelerythrine did not show genotoxicity response in the SOS-Chromotest whereas skimmianine showed genotixicity in the presence of a metabolic activation mixture. Voacristine isolated fromthe leaves of Ervatamia coronaria shows in vivo cytostatic and mutagenic effects in Saccharomyces cerevisiae hapioids cells. The Rauwolfia alkaloid (reserpine was not able to induce reverse mutation and recombinational mitotic events (crossing-over and gene conversion in yeast diploid strain XS2316.

  6. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  7. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  8. Nanoparticle Toxicity Mechanisms: Genotoxicity

    Science.gov (United States)

    Botta, Alain; Benameur, Laı̈la

    Despite the relatively small amount of convincing experimental data, the potentially genotoxic nature of certain nanoparticles seems plausible, owing in particular to the presence of reactive oxygen species (ROS) such as the superoxide anion O2 • - , the hydroxyl radical • OH, and singlet oxygen 1O2, and reactive nitrogen species (RNS) such as nitrogen monoxide NO, the peroxynitrite anion ONOO - , the peroxynitrite radical ONOO • , and dinitrogen trioxide N2O3, a powerful nitration agent.

  9. Genotoxicity of monosodium glutamate.

    Science.gov (United States)

    Ataseven, Nazmiye; Yüzbaşıoğlu, Deniz; Keskin, Ayten Çelebi; Ünal, Fatma

    2016-05-01

    Monosodium glutamate (MSG) is one of the most widely used flavor enhancers throughout the world. The aim of this study is to investigate the genotoxic potential of MSG by using chromosome aberrations (CAs), sister-chromatid exchanges (SCEs), cytokinesis-blocked micronucleus (CBMN), and random amplified polymorphic DNA-polimerase chain reaction (RAPD-PCR) in cultured human lymphocytes and alkaline comet assays in isolated human lymphocytes, which were incubated with six concentrations (250, 500, 1000, 2000, 4000 and 8000 μg/mL) of MSG. The result of this study indicated that MSG significantly and dose dependently increased the frequencies of CAs, SCE and MN in all treatments and times, compared with control. However, the replication (RI) and nuclear division indices (NDI) were not affected. In this paper, in vitro genotoxic effects of the MSG was also investigated on human peripheral lymphocytes by analysing the RAPD-PCR with arbitrary 10-mer primers. The changes occurring in RAPD profiles after MSG treatment include increase or decrease in band intensity and gain or loss of bands. In the comet assay, this additive caused DNA damage at all concentrations in isolated human lymphocytes after 1-h in vitro exposure. Our results demonstrate that MSG is genotoxic to the human peripheral blood lymphocytes in vitro. Copyright © 2016. Published by Elsevier Ltd.

  10. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  11. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  12. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  13. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  14. Exogenous lipid pneumonia

    International Nuclear Information System (INIS)

    Bernasconi, A.; Gavelli, G.; Zompatori, M.; Galleri, C.; Zanasi, A.; Fabbri, M.; Bazzocchi, F.

    1988-01-01

    Exogenous lipid pneumonia (ELP) is caused by the aspiration of animal, vegetal or, more often, mineral oils. Even though it may also be acute, ELP is most frequently a chronic disease, affecting people with predisposing factors, such as neuromuscular disorders, structural abnormalities and so on; very often exogenous lipid pneumonia is found in tracheotomized patients. The pathology of lipid pneumonia is a chronic inflammatory process evolving in foreign-body-like reaction, and eventually in ''end-stage lung'' condition. Clinically, most patients are asymptomatic; few cases only present with cough, dyspnea and chest pain. Eight cases of ELP, studied over the past 3 years, are described in this paper. All the patients were examined by chest radiographs and standard tomograms; 3 patients underwent CT. X-ray features were mono/bilateral consolidation of the lower zones, with air bronchogram and variable reduction in volume. CT density was not specific for fat tissue. In all cases the diagnosis was confirmed at biopsy. In 5 patients, followed for at least one year, clinical-radiological features showed no change. Thus, complications of ELP (especially malignant evolution) could be excluded. The authors conclude that lipid pneumonia must be considered in differential diagnosis of patients with history of usage of oils and compatible X-ray findings. The usefulness of an accurate follow-up is stressed

  15. Genotoxicity of pyrrolizidine alkaloids.

    Science.gov (United States)

    Chen, Tao; Mei, Nan; Fu, Peter P

    2010-04-01

    Pyrrolizidine alkaloids (PAs) are common constituents of many plant species around the world. PA-containing plants are probably the most common poisonous plants affecting livestock and wildlife. They can inflict harm to humans through contaminated food sources, herbal medicines and dietary supplements. Half of the identified PAs are genotoxic and many of them are tumorigenic. The mutagenicity of PAs has been extensively studied in different biological systems. Upon metabolic activation, PAs produce DNA adducts, DNA cross-linking, DNA breaks, sister chromatid exchange, micronuclei, chromosomal aberrations, gene mutations and chromosome mutations in vivo and in vitro. PAs induced mutations in the cII gene of rat liver and in the p53 and K-ras genes of mouse liver tumors. It has been suggested that all PAs produce a set of (+/-)-6,7-dihydro-7-hydroxy-1-hydroxymethyl-5H-pyrrolizine-derived DNA adducts and similar types of gene mutations. The signature types of mutations are G : C --> T : A transversion and tandem base substitutions. Overall, PAs are mutagenic in vivo and in vitro and their mutagenicity appears to be responsible for the carcinogenesis of PAs. (c) 2010 John Wiley & Sons, Ltd.

  16. In silico prediction of genotoxicity.

    Science.gov (United States)

    Wichard, Jörg D

    2017-08-01

    The in silico prediction of genotoxicity has made considerable progress during the last years. The main driver for the pharmaceutical industry is the ICH M7 guideline about the assessment of DNA reactive impurities. An important component of this guideline is the use of in silico models as an alternative approach to experimental testing. The in silico prediction of genotoxicity provides an established and accepted method that defines the first step in the assessment of DNA reactive impurities. This was made possible by the growing amount of reliable Ames screening data, the attempts to understand the activity pathways and the subsequent development of computer-based prediction systems. This paper gives an overview of how the in silico prediction of genotoxicity is performed under the ICH M7 guideline. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Effect of curcumin on the genotoxicity induced by alkylating agents

    Directory of Open Access Journals (Sweden)

    İbrahim Hakkı Ciğerci

    2015-06-01

    Full Text Available The protection of the structure of DNA is extremly important to transfer genetic information from generation to generation. DNA damage due to genotoxic ess is an important type of stress which organisms are exposed during their life. The factors that cause DNA damage can be endogenous and exogenous. Among exogenous sources, alkylating agents comes first to cause DNA damage. Alkylating exogenous agents are capable of adding bases to ethyl or methyl groups. The direct-acting alkylating agent methyl methanesulfonate (MMS, is covalently linked to DNA and cause DNA damage, creating an indirect effect of the alkylating agent. cyclophosphamide (CP causes the DNA damage by changing the function of cellular proteins. Both substances have been shown to induce gene mutations in prokaryotes and eukaryotes, chromosome effects, unscheduled DNA synthesis and sister chromatid exchange. Furthermore, cessation of cell growth arrest and DNA damage causing changes in gene expression have been observed by the stress due to alkylating agents exposure. In this study, the effects of curcumin on MMS and CP treated mice were investigated. Alkaline comet assay was used to detect DNA damage. Curcumin reduced the DNA damage, occurred by both MMS and CP induction. We could state that curcumin, a phenolic compound shows protective effects before the damage. In brief, curcumin has both antioxidant and antigenotoxic effects.

  18. Genotoxicity test of irradiated foods

    International Nuclear Information System (INIS)

    Tanaka, Noriho

    2004-01-01

    Safety tests of radiation irradiated foods started as early as from 1967 in Japan and genotoxicity tests in the Hatano Res. Inst., from 1977. The latter is unique in the world and is reviewed in this paper. Tests included those for the initial injury of DNA, mutagenicity, chromosomal aberration and transformation with use of bacteria, cultured mammalian cells and animals (for chromosomal aberration, micronucleus formation and dominant lethality). Foods tested hitherto were onion, rice, wheat and flour, Vienna sausage, fish sausage (kamaboko), mandarian orange, potato, black pepper and red capsicum, of which extract or powder was subjected to the test. Irradiation doses and its purposes were 0.15-6 kGy γ-ray ( 60 Co) or electron beam by the accelerator (only for the orange), and suppression of germination, pesticide action or sterilization, respectively. Genotoxicity of all foods under tested conditions is shown negative. (N.I.)

  19. Cell-Based Genotoxicity Testing

    Science.gov (United States)

    Reifferscheid, Georg; Buchinger, Sebastian

    Genotoxicity test systems that are based on bacteria display an important role in the detection and assessment of DNA damaging chemicals. They belong to the basic line of test systems due to their easy realization, rapidness, broad applicability, high sensitivity and good reproducibility. Since the development of the Salmonella microsomal mutagenicity assay by Ames and coworkers in the early 1970s, significant development in bacterial genotoxicity assays was achieved and is still a subject matter of research. The basic principle of the mutagenicity assay is a reversion of a growth inhibited bacterial strain, e.g., due to auxotrophy, back to a fast growing phenotype (regain of prototrophy). Deeper knowledge of the ­mutation events allows a mechanistic understanding of the induced DNA-damage by the utilization of base specific tester strains. Collections of such specific tester strains were extended by genetic engineering. Beside the reversion assays, test systems utilizing the bacterial SOS-response were invented. These methods are based on the fusion of various SOS-responsive promoters with a broad variety of reporter genes facilitating numerous methods of signal detection. A very important aspect of genotoxicity testing is the bioactivation of ­xenobiotics to DNA-damaging compounds. Most widely used is the extracellular metabolic activation by making use of rodent liver homogenates. Again, genetic engineering allows the construction of highly sophisticated bacterial tester strains with significantly enhanced sensitivity due to overexpression of enzymes that are involved in the metabolism of xenobiotics. This provides mechanistic insights into the toxification and detoxification pathways of xenobiotics and helps explaining the chemical nature of hazardous substances in unknown mixtures. In summary, beginning with "natural" tester strains the rational design of bacteria led to highly specific and sensitive tools for a rapid, reliable and cost effective ­genotoxicity

  20. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  2. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  3. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  4. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  6. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  7. What Is a Heart Attack?

    Science.gov (United States)

    ... Research Home / Heart Attack Heart Attack Also known as Myocardial infarction Leer en español ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  8. Toward a Genotoxic Protection Factor

    International Nuclear Information System (INIS)

    Cesarini, J.P.; Demanneville, S.

    2000-01-01

    P53, a molecule normally expressed before mitosis, is considered as the 'guardian of the genome'. In the skin its level is normally very low (<3% of cells), detected by immunohistochemical methods. At least 50% of the keratinocytes express p53 protein, 24 h following a significant UV irradiation (2 SED). It is expected using sunscreens to reduce the expression of p53 in parallel with their ability to reduce the actinic erythema, the endpoint adopted to evaluate the Sun Protection Factor (SPF) of sunscreens. P53 detection on biopsies performed on the buttocks of human volunteers was used to evaluate the genotoxic protecting factor (GPF) of several sunscreens with either high UVB filtration or high UVA filtration, characterised by various SPF (COLIPA) from 10 to 40. The p53 count in parallel with sunburn cell count were the parameters studied. In general, the GPF of the sunscreens was found below the proprietary SPF. If a genotoxic effect is shown in an increased p53 expression, this effect is still observed at a dose lower than the dose inducing the faintest actinic erythema. (author)

  9. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Exogenic and endogenic Europa minerals

    Science.gov (United States)

    Maynard-Casely, H. E.; Brand, H. E. A.; Wilson, S. A.

    2016-12-01

    The Galileo Near Infrared Mapping Spectrometer (NIMS) identified a significant `non-ice' component upon the surface of Jupiter's moon Europa. Current explanations invoke both endogenic and exogenic origins for this material. It has long been suggested that magnesium and sodium sulfate minerals could have leached from the rock below a putative ocean (endogenic) 1 and that sulfuric acid hydrate minerals could have been radiologically produced from ionised sulfur originally from Io's volcanoes (exogenic) 2. However, a more recent theory proposes that the `non-ice' component could be radiation damaged NaCl leached from Europa's speculative ocean 3. What if the minerals are actually from combination of both endogenic and exogenic sources? To investigate this possibility we have focused on discovering new minerals that might form in the combination of the latter two cases, that is a mixture of leached sulfates hydrates with radiologically produced sulfuric acid. To this end we have explored a number of solutions in the MgSO4-H2SO4-H2O and Na2SO4-H2SO4-H2O systems, between 80 and 280 K with synchrotron x-ray powder diffraction. We report a number of new materials formed in this these ternary systems. This suggests that it should be considered that the `non-ice' component of the Europa's surface could be a material derived from endogenic and exogenic components. 1 Kargel, J. S. Brine volcanism and the interior structures of asteroids and icy satellites. Icarus 94, 368-390 (1991). 2 Carlson, R. W., Anderson, M. S., Mehlman, R. & Johnson, R. E. Distribution of hydrate on Europa: Further evidence for sulfuric acid hydrate. Icarus 177, 461-471, doi:10.1016/j.icarus.2005.03.026 (2005). 3 Hand, K. P. & Carlson, R. W. Europa's surface color suggests an ocean rich with sodium chloride. Geophysical Research Letters, 2015GL063559, doi:10.1002/2015gl063559 (2015).

  13. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  14. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  15. Decisions to regulate genotoxic substances

    International Nuclear Information System (INIS)

    Bengtsson, G.

    1988-01-01

    Decisions to regulate genotoxic substances involve trade-offs between various incomparable factors such as risks to human health and other environmental risks, public perceptions, costs and uncertainties. Two different approaches towards these trade-offs are discussed. In one approach, all relevant factors are defined and trade-offs are considered using a general and very elaborate analysis. Cost-benefit analysis is an exponent of this approach. An illustration is given for the regulation of transboundary releases of radioactive materials. The other approach considers what is politically feasible for the time being and seeks a decision with much room for later corrections. Incrementalism is a philosophy in this vein. It is illustrated by reference to the regulation of transboundary air pollution. Weaknesses and strengths of the two approaches are discussed. (author)

  16. Genotoxic Klebsiella pneumoniae in Taiwan.

    Directory of Open Access Journals (Sweden)

    Yi-Chyi Lai

    Full Text Available BACKGROUND: Colibactin is a nonribosomal peptide-polyketide synthesized by multi-enzyme complexes encoded by the pks gene cluster. Colibactin-producing Escherichia coli have been demonstrated to induce host DNA damage and promote colorectal cancer (CRC development. In Taiwan, the occurrence of pyogenic liver abscess (PLA has been suggested to correlate with an increasing risk of CRC, and Klebsiella pneumoniae is the predominant PLA pathogen in Taiwan. METHODOLOGY/PRINCIPAL FINDINGS: At the asn tRNA loci of the newly sequenced K. pneumoniae 1084 genome, we identified a 208-kb genomic island, KPHPI208, of which a module identical to the E. coli pks colibactin gene cluster was recognized. KPHPI208 consists of eight modules, including the colibactin module and the modules predicted to be involved in integration, conjugation, yersiniabactin production, microcin production, and unknown functions. Transient infection of BALB/c normal liver cells with K. pneumoniae 1084 increased the phosphorylation of histone H2AX, indicating the induction of host DNA damage. Colibactin was required for the genotoxicity of K. pneumoniae 1084, as it was diminished by deletion of clbA gene and restored to the wild type level by trans-complementation with a clbA coding plasmid. Besides, BALB/c mice infected with K. pneumoniae 1084 exhibited enhanced DNA damage in the liver parenchymal cells when compared to the isogenic clbA deletion mutant. By PCR detection, the prevalence of pks-positive K. pneumoniae in Taiwan is 25.6%, which is higher than that reported in Europe (3.5%, and is significantly correlated with K1 type, which predominantly accounted for PLA in Taiwan. CONCLUSIONS: Our knowledge regarding how bacteria contribute to carcinogenesis has just begun. The identification of genotoxic K. pneumoniae and its genetic components will facilitate future studies to elucidate the molecular basis underlying the link between K. pneumoniae, PLA, and CRC.

  17. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  18. Genotoxic effects of environmental pollutants genotoxic monitoring and detection of antigenotoxic effects

    International Nuclear Information System (INIS)

    Simic, D.; Knezevic-Vukcevic, J.; Vukovi -Gacic, B.; Mitic, D.; Beric, T.; Nikolic, B.; Stanojevic, J.; Stankovic, S.

    2002-01-01

    The control of genotoxic agents mass release, which can adversely affect the ecosystem stability and human health is of the greatest importance. Therefore, it is necessary to seriously elaborate the strategy of genotoxic monitoring and relevant legislation. Additional approach is the study and dietary use of antigenotoxic plant substances for prevention of mutation-related diseases. (author)

  19. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  3. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  4. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  5. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  6. Genotoxicity of Chlorpyrifos, Alpha-thrin, Efekto virikop and ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-12-03

    Dec 3, 2008 ... Chlorpyrifos was genotoxic (P < 0.05), inducing chromosome lagging and bridges, pulverized and stick chromosomes, multipolar anaphase and telophase. Efekto virikop and springbok induced lagging chromosomes. Alpha-thrin was not genotoxic. Key words: Allium cepa, cytotoxicity, genotoxicity, mitotic ...

  7. GENOTOXICITY OF TOBACCO SMOKE AND TOBACCO SMOKE CONDENSATE: A REVIEW

    Science.gov (United States)

    Genotoxicity of Tobacco Smoke and Tobacco Smoke Condensate: A ReviewAbstractThis report reviews the literature on the genotoxicity of main-stream tobacco smoke and cigarette smoke condensate (CSC) published since 1985. CSC is genotoxic in nearly all systems in which it h...

  8. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  9. Natural Antioxidants Against Arsenic-Induced Genotoxicity.

    Science.gov (United States)

    Kumar, Munesh; Lalit, Minakshi; Thakur, Rajesh

    2016-03-01

    Arsenic is present in water, soil, and air in organic as well as in inorganic forms. However, inorganic arsenic is more toxic than organic and can cause many diseases including cancers in humans. Its genotoxic effect is considered as one of its carcinogenic actions. Arsenic can cause DNA strand breaks, deletion mutations, micronuclei formation, DNA-protein cross-linking, sister chromatid exchange, and DNA repair inhibition. Evidences indicate that arsenic causes DNA damage by generation of reactive free radicals. Nutritional supplementation of antioxidants has been proven highly beneficial against arsenic genotoxicity in experimental animals. Recent studies suggest that antioxidants protect mainly by reducing excess free radicals via restoring the activities of cellular enzymatic as well as non-enzymatic antioxidants and decreasing the oxidation processes such as lipid peroxidation and protein oxidation. The purpose of this review is to summarize the recent literature on arsenic-induced genotoxicity and its mitigation by naturally derived antioxidants in various biological systems.

  10. Environmental genotoxicity: Probing the underlying mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Shugart, L. [Oak Ridge National Lab., TN (United States); Theodorakis, C. [Tennessee Univ., Knoxville, TN (United States)

    1993-12-31

    Environmental pollution is a complex issue because of the diversity of anthropogenic agents, both chemical and physical, that have been detected and catalogued. The consequences to biota from exposure to genotoxic agents present an additional problem because of the potential for these agents to produce adverse change at the cellular and organismal levels. Past studies in genetic toxicology at the Oak Ridge National Laboratory have focused on structural damage to the DNA of environmental species that may occur after exposure to genotoxic agents and the use of this information to document exposure and to monitor remediation. In an effort to predict effects at the population, community and ecosystem levels, current studies in genetic ecotoxicology are attempting to characterize the biological mechanisms at the gene level that regulate and limit the response of an individual organism to genotoxic factors in their environment.

  11. Genotoxic evaluation of polymeric nanoparticles

    Directory of Open Access Journals (Sweden)

    Tamara Iglesias Alonso

    2015-06-01

    Full Text Available An important strategy for optimizing the therapeutic efficacy of many conventional drugs is the development of polymeric nanoparticles (NPs, as it may expand their activities, reduce their toxicity, increase their bioactivity and improve biodistribution. The main objective of this study was to evaluate the genotoxicity of 8 different poly (anhydride NPs designed for the oral administration of therapeutic compounds by using the comet assay in combination with the enzyme formamidopypiridine DNA-glycosylase (FPG. Furthermore, the mitogen capacity of the NPs was evaluated by the proliferation assay. All NPs were tested at four concentrations (0, 0.5, 1 and 2 mg/mL in Caco-2 cells after 3 hours of treatment while selected NPs were also tested after 24 h. The comet assay was performed immediately after the treatment and cell proliferation was assessed by counting the treated cells after their incubation at 37 °C for 48h. Cells treated with 1 µM of the photosensitizer Ro 19-8022 plus 5 min of light, as well as cells treated with 100 µM H2O2 were included as positive controls in all the experiments. All NPs studied did not result in any increase in the frequency of strand breaks or alkali-labile sites in Caco-2 cells but they induced a slight concentration-dependent increase in net FPG sensitive sites (oxidized and/or alkylated bases. Furthermore, treated cells did not show changes in levels of proliferation in comparison with the negative control.

  12. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  13. Exogenous melatonin administration is beneficial for male ...

    African Journals Online (AJOL)

    Background: A concern in the use of exogenous melatonin as a therapeutic intervention is that it may interfere with reproductive function. Herein, we report that chronic exogenous melatonin administration does not impair male reproductive function during ageing and at old age in male Sprague Dawley rats. Methods: ...

  14. Exogenous melatonin administration is beneficial for male ...

    African Journals Online (AJOL)

    ABSTRACT. Background: A concern in the use of exogenous melatonin as a therapeutic intervention is that it may interfere with reproductive function. Herein, we report that chronic exogenous melatonin administration does not impair male reproductive function during ageing and at old age in male Sprague Dawley rats.

  15. Depression After Heart Attack

    Science.gov (United States)

    ... Heart Attack? Redford B. Williams Download PDF https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Circulation. 2011; 123: ... e639-e640 , originally published June 27, 2011 https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Citation Manager Formats ...

  16. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  17. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  18. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  19. Contributions of DNA repair and damage response pathways to the non-linear genotoxic responses of alkylating agents

    Science.gov (United States)

    Klapacz, Joanna; Pottenger, Lynn H.; Engelward, Bevin P.; Heinen, Christopher D.; Johnson, George E.; Clewell, Rebecca A.; Carmichael, Paul L.; Adeleye, Yeyejide; Andersen, Melvin E.

    2016-01-01

    From a risk assessment perspective, DNA-reactive agents are conventionally assumed to have genotoxic risks at all exposure levels, thus applying a linear extrapolation for low-dose responses. New approaches discussed here, including more diverse and sensitive methods for assessing DNA damage and DNA repair, strongly support the existence of measurable regions where genotoxic responses with increasing doses are insignificant relative to control. Model monofunctional alkylating agents have in vitro and in vivo datasets amenable to determination of points of departure (PoDs) for genotoxic effects. A session at the 2013 Society of Toxicology meeting provided an opportunity to survey the progress in understanding the biological basis of empirically-observed PoDs for DNA alkylating agents. Together with the literature published since, this review discusses cellular pathways activated by endogenous and exogenous alkylation DNA damage. Cells have evolved conserved processes that monitor and counteract a spontaneous steady-state level of DNA damage. The ubiquitous network of DNA repair pathways serves as the first line of defense for clearing of the DNA damage and preventing mutation. Other biological pathways discussed here that are activated by genotoxic stress include post-translational activation of cell cycle networks and transcriptional networks for apoptosis/cell death. The interactions of various DNA repair and DNA damage response pathways provide biological bases for the observed PoD behaviors seen with genotoxic compounds. Thus, after formation of DNA adducts, the activation of cellular pathways can lead to the avoidance a mutagenic outcome. The understanding of the cellular mechanisms acting within the low-dose region will serve to better characterize risks from exposures to DNA-reactive agents at environmentally-relevant concentrations. PMID:27036068

  20. Contributions of DNA repair and damage response pathways to the non-linear genotoxic responses of alkylating agents.

    Science.gov (United States)

    Klapacz, Joanna; Pottenger, Lynn H; Engelward, Bevin P; Heinen, Christopher D; Johnson, George E; Clewell, Rebecca A; Carmichael, Paul L; Adeleye, Yeyejide; Andersen, Melvin E

    2016-01-01

    From a risk assessment perspective, DNA-reactive agents are conventionally assumed to have genotoxic risks at all exposure levels, thus applying a linear extrapolation for low-dose responses. New approaches discussed here, including more diverse and sensitive methods for assessing DNA damage and DNA repair, strongly support the existence of measurable regions where genotoxic responses with increasing doses are insignificant relative to control. Model monofunctional alkylating agents have in vitro and in vivo datasets amenable to determination of points of departure (PoDs) for genotoxic effects. A session at the 2013 Society of Toxicology meeting provided an opportunity to survey the progress in understanding the biological basis of empirically-observed PoDs for DNA alkylating agents. Together with the literature published since, this review discusses cellular pathways activated by endogenous and exogenous alkylation DNA damage. Cells have evolved conserved processes that monitor and counteract a spontaneous steady-state level of DNA damage. The ubiquitous network of DNA repair pathways serves as the first line of defense for clearing of the DNA damage and preventing mutation. Other biological pathways discussed here that are activated by genotoxic stress include post-translational activation of cell cycle networks and transcriptional networks for apoptosis/cell death. The interactions of various DNA repair and DNA damage response pathways provide biological bases for the observed PoD behaviors seen with genotoxic compounds. Thus, after formation of DNA adducts, the activation of cellular pathways can lead to the avoidance of a mutagenic outcome. The understanding of the cellular mechanisms acting within the low-dose region will serve to better characterize risks from exposures to DNA-reactive agents at environmentally-relevant concentrations. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Investigation of genotoxicity in river sediments

    Directory of Open Access Journals (Sweden)

    Šestinová Oľga

    2017-12-01

    Full Text Available The purpose of the present study was to develop a useful screening method to assess genotoxic effect of polluted bottom sediments from the water reservoir Ružin No.I. The Hornád and Hnilec Rivers drained a former mining area, have been polluted in the long-term by heavy metals (Cu, As, Sb, Hg, which significantly contributed to environmental degradation. Genotoxicity of bottom sediment was evaluated by test SOS-ChromoPadTM 3.0 for solid samples without extraction. The mentioned test represents simple, quick and direct sediment phase toxicity testing procedure. In this test bacterial strain Escherichia coli K12 PQ37 was used. The results of SOS-ChromoPadTM 3.0 showed that sample Hornád has low potential genotoxic effect on the environment. It was determined on the basis of slight blue colouration of chromogenic paper at the point of sediment application. The sample Hnilec was negative. This test allows significantly reduce the time for obtaining information about sediments genotoxicity and accept necessary security proceeding in time.

  2. Comparative physicochemical and genotoxicity assessments of ...

    African Journals Online (AJOL)

    The textile industry has become indispensable in view of its basic and social importance to human life, but its environmental impact has continued to be a subject of concern. The objectives of the present study were to assess and compare the physico-chemical and genotoxicity properties of a corporate textile mill effluent ...

  3. A novel mechanism of oxidative genotoxicity

    Indian Academy of Sciences (India)

    The genotoxicity of reactive oxygen species (ROS) is well established. The underlying mechanism involves oxidation of DNA by ROS. However, we have recently shown that hydrogen peroxide (H2O2), the major mediator of oxidative stress, can also cause genomic damage indirectly. Thus, H2O2 at pathologically relevant ...

  4. Rifampicin: Cytotoxic and Genotoxic Action | Olufunsho | Nigerian ...

    African Journals Online (AJOL)

    The purpose of this study was to investigate the cytotoxic and genotoxic effects of Rif to better understand its mutagenicity. The study was carried out using three methods: Standard Allium cepa (Linn.) assay, modified Ames test (which is a modification of the standard Ames assay) and micronucleus test (an in vivo method ...

  5. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  6. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  7. Genotoxicity assessment of 4-methylimidazole: regulatory perspectives.

    Science.gov (United States)

    Morita, Takeshi; Uneyama, Chikako

    2016-01-01

    4-Methylimidazole (4-MI) is formed as a result of the Maillard reaction process, and therefore is found in many foods and beverages. It is also found in soft drinks (i.e., cola) as a by-product in the production of some caramel colors. NTP bioassays revealed clear evidence of lung carcinogenicity of 4-MI in male and female mice, but not in rats and then IARC classified 4-MI as group 2B carcinogen. Genotoxicity studies with 4-MI were negative in the Ames tests and in the erythrocyte micronucleus tests with mice or rats. US California EPA (CEPA) evaluated the testing has not been adequately comprehensive to rule out a genotoxic mode of action; as target tissue of the carcinogenicity of 4-MI was lung, the lung should be used as a source tissue for in vitro metabolic activation system. Thus, CEPA defined the No Significant Risk Level (NSRL) for 10 -5 lifetime risk level of cancer by 4-MI as 29 μg/day based on the non-threshold approach. As higher levels of 4-MI than the NSRL were identified in some kinds of cola, health concerns of 4-MI were drawn the attention. On the other hand, other regulatory bodies (e.g., European Food Safety Authority, EFSA) showed no concerns of 4-MI from the use of caramel colors in food. EFSA evaluated 4-MI is not genotoxic, so, non-observed adverse effect level of 4-MI was considered to be 80 mg/kg/day. In this paper, genotoxic assessments of 4-MI in different regulatory bodies are presented and the risk evaluation of 4-MI is discussed based on new genotoxicity data.

  8. Heart Attack Coronary Artery Disease

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  9. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  10. What Is a Heart Attack?

    Science.gov (United States)

    ... to help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... blood to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  11. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  12. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  13. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  14. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  15. Is Money Really Exogenous? Testing for Weak Exogeneity in Swiss Money Demand.

    OpenAIRE

    Fischer, Andreas M

    1993-01-01

    Although exogeneity is often associated with controllable policy variables, Engle, Hendry, and Richard (1983) show that the one condition is neither necessary nor sufficient for the other. Whether variables such as monetary aggregates are (weakly) exogenous depends on the conditioning properties of the data generating process. Testing exogeneity claims represents an important step in analyzing money demand functions. Although Switzerland adheres to fairly strict monetarist prescriptions, we r...

  16. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  17. Ecotoxicity and genotoxicity assessment of cytostatic pharmaceuticals

    Czech Academy of Sciences Publication Activity Database

    Zounková, R.; Odráška, P.; Doležalová, L.; Hilscherová, Klára; Maršálek, Blahoslav; Bláha, Luděk

    2007-01-01

    Roč. 26, č. 10 (2007), s. 2208-2214 ISSN 0730-7268 Grant - others:GA MŠk(CZ) 2B06171; ECODIS(XE) 518043-1 Institutional research plan: CEZ:AV0Z60050516 Source of funding: R - rámcový projekt EK Keywords : cytostatic pharmaceuticals * genotoxicity * antineoplastics Subject RIV: EF - Botanics Impact factor: 2.309, year: 2007

  18. Genoprotective and Genotoxic Effects of Thymoquinone on ...

    African Journals Online (AJOL)

    Comet assays and apoptotic cell studies were performed to evaluate the effect of TQ on the cytotoxicity and genotoxicity-induced by DXR. Results: TQ treatment, alone, (5.0, 10, or 20 µM) increased DNA damage index (DI) in a concentrationdependent manner (0.64 ± 0.09, 0.84 ± 0.07, and 0.93 ± 0.06, respectively).

  19. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  20. Cytotoxicity and genotoxicity of biogenic silver nanoparticles

    International Nuclear Information System (INIS)

    Lima, R; Feitosa, L O; Ballottin, D; Tasic, L; Durán, N; Marcato, P D

    2013-01-01

    Biogenic silver nanoparticles with 40.3 ± 3.5 nm size and negative surface charge (− 40 mV) were prepared with Fusarium oxysporum. The cytotoxicity of 3T3 cell and human lymphocyte were studied by a TaliTM image-based cytometer and the genotoxicity through Allium cepa and comet assay. The results of BioAg-w (washed) and BioAg-nw (unwashed) biogenic silver nanoparticles showed cytotoxicity exceeding 50 μg/mL with no significant differences of response in 5 and 10 μg/mL regarding viability. Results of genotoxicity at concentrations 5.0 and 10.0 ug/mL show some response, but at concentrations 0.5 and 1.0 μg/mL the washed and unwashed silver nanoparticles did not present any effect. This in an important result since in tests with different bacteria species and strains, including resistant, MIC (minimal inhibitory concentration) had good answers at concentrations less than 1.9 μg/mL. This work concludes that biogenic silver nanoparticles may be a promising option for antimicrobial use in the range where no cyto or genotoxic effect were observed. Furthermore, human cells were found to have a greater resistance to the toxic effects of silver nanoparticles in comparison with other cells.

  1. METABOLISM, GENOTOXICITY, AND CARCINOGENICITY OF COMFREY

    Science.gov (United States)

    Mei, Nan; Guo, Lei; Fu, Peter P.; Fuscoe, James C.; Luan, Yang; Chen, Tao

    2018-01-01

    Comfrey has been consumed by humans as a vegetable and a tea and used as an herbal medicine for more than 2000 years. Comfrey, however, produces hepatotoxicity in livestock and humans and carcinogenicity in experimental animals. Comfrey contains as many as 14 pyrrolizidine alkaloids (PA), including 7-acetylintermedine, 7-acetyllycopsamine, echimidine, intermedine, lasiocarpine, lycopsamine, myoscorpine, symlandine, symphytine, and symviridine. The mechanisms underlying comfrey-induced genotoxicity and carcinogenicity are still not fully understood. The available evidence suggests that the active metabolites of PA in comfrey interact with DNA in liver endothelial cells and hepatocytes, resulting in DNA damage, mutation induction, and cancer development. Genotoxicities attributed to comfrey and riddelliine (a representative genotoxic PA and a proven rodent mutagen and carcinogen) are discussed in this review. Both of these compounds induced similar profiles of 6,7-dihydro-7-hydroxy-1-hydroxymethyl-5H-pyrrolizine (DHP)-derived DNA adducts and similar mutation spectra. Further, the two agents share common mechanisms of drug metabolism and carcinogenesis. Overall, comfrey is mutagenic in liver, and PA contained in comfrey appear to be responsible for comfrey-induced toxicity and tumor induction. PMID:21170807

  2. Metabolism, genotoxicity, and carcinogenicity of comfrey.

    Science.gov (United States)

    Mei, Nan; Guo, Lei; Fu, Peter P; Fuscoe, James C; Luan, Yang; Chen, Tao

    2010-10-01

    Comfrey has been consumed by humans as a vegetable and a tea and used as an herbal medicine for more than 2000 years. Comfrey, however, produces hepatotoxicity in livestock and humans and carcinogenicity in experimental animals. Comfrey contains as many as 14 pyrrolizidine alkaloids (PA), including 7-acetylintermedine, 7-acetyllycopsamine, echimidine, intermedine, lasiocarpine, lycopsamine, myoscorpine, symlandine, symphytine, and symviridine. The mechanisms underlying comfrey-induced genotoxicity and carcinogenicity are still not fully understood. The available evidence suggests that the active metabolites of PA in comfrey interact with DNA in liver endothelial cells and hepatocytes, resulting in DNA damage, mutation induction, and cancer development. Genotoxicities attributed to comfrey and riddelliine (a representative genotoxic PA and a proven rodent mutagen and carcinogen) are discussed in this review. Both of these compounds induced similar profiles of 6,7-dihydro-7-hydroxy-1-hydroxymethyl-5H-pyrrolizine (DHP)-derived DNA adducts and similar mutation spectra. Further, the two agents share common mechanisms of drug metabolism and carcinogenesis. Overall, comfrey is mutagenic in liver, and PA contained in comfrey appear to be responsible for comfrey-induced toxicity and tumor induction.

  3. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  4. Detection of genotoxic and non-genotoxic carcinogens in Xpc−/−p53+/− mice

    International Nuclear Information System (INIS)

    Melis, Joost P.M.; Speksnijder, Ewoud N.; Kuiper, Raoul V.; Salvatori, Daniela C.F.; Schaap, Mirjam M.; Maas, Saskia; Robinson, Joke; Verhoef, Aart; Benthem, Jan van; Luijten, Mirjam; Steeg, Harry van

    2013-01-01

    An accurate assessment of the carcinogenic potential of chemicals and pharmaceutical drugs is essential to protect humans and the environment. Therefore, substances are extensively tested before they are marketed to the public. Currently, the rodent two-year bioassay is still routinely used to assess the carcinogenic potential of substances. However, over time it has become clear that this assay yields false positive results and also has several economic and ethical drawbacks including the use of large numbers of animals, the long duration, and the high cost. The need for a suitable alternative assay is therefore high. Previously, we have proposed the Xpa*p53 mouse model as a very suitable alternative to the two-year bioassay. We now show that the Xpc*p53 mouse model preserves all the beneficial traits of the Xpa*p53 model for sub-chronic carcinogen identification and can identify both genotoxic and non-genotoxic carcinogens. Moreover, Xpc*p53 mice appear to be more responsive than Xpa*p53 mice towards several genotoxic and non-genotoxic carcinogens. Furthermore, Xpc*p53 mice are far less sensitive than Xpa*p53 mice for the toxic activity of DNA damaging agents and as such clearly respond in a similar way as wild type mice do. These advantageous traits of the Xpc*p53 model make it a better alternative for in vivo carcinogen testing than Xpa*p53. This pilot study suggests that Xpc*p53 mice are suited for routine sub-chronic testing of both genotoxic and non-genotoxic carcinogens and as such represent a suitable alternative to possibly replace the murine life time cancer bioassay. Highlights: ► The Xpc*p53 mouse model is able to identify genotoxic and non-genotoxic carcinogens. ► Time, animals and cost can be significantly reduced compared to the 2-year bioassay. ► Xpc*p53 mice are more advantageous for carcinogen identification than Xpa*p53 mice. ► Xpc*p53 mice exhibit a wild type response upon exposure to genotoxicants.

  5. A predictive toxicogenomics signature to classify genotoxic versus non-genotoxic chemicals in human TK6 cells

    Directory of Open Access Journals (Sweden)

    Andrew Williams

    2015-12-01

    Full Text Available Genotoxicity testing is a critical component of chemical assessment. The use of integrated approaches in genetic toxicology, including the incorporation of gene expression data to determine the DNA damage response pathways involved in response, is becoming more common. In companion papers previously published in Environmental and Molecular Mutagenesis, Li et al. (2015 [6] developed a dose optimization protocol that was based on evaluating expression changes in several well-characterized stress-response genes using quantitative real-time PCR in human lymphoblastoid TK6 cells in culture. This optimization approach was applied to the analysis of TK6 cells exposed to one of 14 genotoxic or 14 non-genotoxic agents, with sampling 4 h post-exposure. Microarray-based transcriptomic analyses were then used to develop a classifier for genotoxicity using the nearest shrunken centroids method. A panel of 65 genes was identified that could accurately classify toxicants as genotoxic or non-genotoxic. In Buick et al. (2015 [1], the utility of the biomarker for chemicals that require metabolic activation was evaluated. In this study, TK6 cells were exposed to increasing doses of four chemicals (two genotoxic that require metabolic activation and two non-genotoxic chemicals in the presence of rat liver S9 to demonstrate that S9 does not impair the ability to classify genotoxicity using this genomic biomarker in TK6cells.

  6. Lilium compounds kaempferol and jatropham can modulate cytotoxic and genotoxic effects of radiomimetic zeocin in plants and human lymphocytes In vitro.

    Science.gov (United States)

    Jovtchev, Gabriele; Gateva, Svetla; Stankov, Alexander

    2016-06-01

    Organisms are constantly exposed to the detrimental effect of environmental DNA-damaging agents. The harmful effects of environmental genotoxins could be decreased in a viable way by antimutagenesis. One of the modern approaches to reduce the mutagenic burden is based on exogenous natural and synthetic compounds that possess protective and antimutagenic potential against genotoxins. The natural compounds kaempferol and jatropham isolated from Lilium candidum were tested with respect to their potential to protect cells against the radiomimetic zeocin, as well as to their cytotoxic and genotoxic activities in two types of experimental eukaryotic test systems: Hordeum vulgare and human lymphocytes in vitro. Mitotic index (MI) was used as an endpoint for cytotoxicity; the frequency of chromosome aberrations (MwA) and the number of induced micronuclei (MN), as endpoints for genotoxicity/clastogenicity. Formation of aberration "hot spots" was also used as an indicator for genotoxicity in H. vulgare. Both kaempferol and jatropham were shown to possess a potential to modulate and decrease the cytotoxic and genotoxic/clastogenic effect of zeocin depending on the experimental design and the test system. Our data could be useful for health research programs, particularly in clarifying the pharmacological potential and activity of natural plant compounds. © 2014 Wiley Periodicals, Inc. Environ Toxicol 31: 751-764, 2016. © 2014 Wiley Periodicals, Inc.

  7. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  8. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  9. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  10. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  11. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  12. Considerations on photochemical genotoxicity. II: Report of the 2009 International Workshop on Genotoxicity Testing Working Group

    NARCIS (Netherlands)

    Lynch, A.M.; Guzzie, P.J.; Bauer, D.; Gocke, E.; Itoh, S.; Jacobs, A.; Krul, C.A.M.; Schepky, A.; Tanaka, N.; Kasper, P.

    2011-01-01

    A workshop to reappraise the previous IWGT recommendations for photogenotoxicity testing [E. Gocke, L. Muller, P.J. Guzzie, S. Brendler-Schwaab, S. Bulera, C.F. Chignell, L.M. Henderson, A. Jacobs, H. Murli, R.D. Snyder, N. Tanaka, Considerations on photochemical genotoxicity: report of the

  13. Genotoxicity Of Petroleum Refinery Waste Water In Nigeria | Obute ...

    African Journals Online (AJOL)

    Lower concentrations (20%-40%) induced c-mitosis as the major aberration. The advantages of genotoxicity screening over general toxicity testing in environmental monitoring was highlighted. Key Words: Allium test, pollution, genotoxicity, chromosome, wastewater. Global Journal of Environmental Sciences Vol.3(1&2) ...

  14. Genotoxicity of hormoban and seven other pesticides to onion root ...

    African Journals Online (AJOL)

    Plants are direct recipients of agro-toxics and therefore important materials for assessing environmental chemicals for genotoxicity. Three doses, representing ¼, ½ and EC50 of hormoban, storm killer, villa, fungi-nil, bexadust, aphicide, karbadust and basagran were assessed for cytotoxic and genotoxic effects to onion root ...

  15. Chlorination of tramadol: Reaction kinetics, mechanism and genotoxicity evaluation.

    Science.gov (United States)

    Cheng, Hanyang; Song, Dean; Chang, Yangyang; Liu, Huijuan; Qu, Jiuhui

    2015-12-01

    Tramadol (TRA) is one of the most detected analgesics in environmental matrices, and it is of high significance to study the reactivity of TRA during chlorination considering its potential toxicity to the environment. The chlorine/TRA reaction is first order with respect to the TRA concentration, and a combination of first-order and second-order with respect to chlorine concentration. The pH dependence of the observed rate constants (kobs) showed that the TRA oxidation reactivity increased with increasing pH. kobs can be quantitatively described by considering all active species including Cl2, Cl2O and HOCl, and the individual rate constants of HOCl/TRA(0), HOCl/TRAH(+), Cl2/TRA and Cl2O/TRA reactions were calculated to be (2.61±0.29)×10(3)M(-1)s(-1), 14.73±4.17M(-1)s(-1), (3.93±0.34)×10(5)M(-1)s(-1) and (5.66±1.83)×10(6)M(-1)s(-1), respectively. Eleven degradation products were detected with UPLC-Q-TOF-MS, and the corresponding structures of eight products found under various pH conditions were proposed. The amine group was proposed to be the initial attack site under alkaline pH conditions, where reaction of the deprotonated amine group with HOCl is favorable. Under acidic and neutral pH conditions, however, two possible reaction pathways were proposed. One is an electrophilic substitution on the aromatic ring, and another is an electrophilic substitution on the nitrogen, leading to an N-chlorinated intermediate, which can be further oxidized. Finally, the SOS/umu test showed that the genotoxicity of TRA chlorination products increased with increasing dosage of chlorine, which was mostly attributed to the formation of some chlorine substitution products. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Evaluation of the genotoxicity of cellulose nanofibers.

    Science.gov (United States)

    de Lima, Renata; Oliveira Feitosa, Leandro; Rodrigues Maruyama, Cintia; Abreu Barga, Mariana; Yamawaki, Patrícia Cristina; Vieira, Isolda Jesus; Teixeira, Eliangela M; Corrêa, Ana Carolina; Caparelli Mattoso, Luiz Henrique; Fernandes Fraceto, Leonardo

    2012-01-01

    Agricultural products and by products provide the primary materials for a variety of technological applications in diverse industrial sectors. Agro-industrial wastes, such as cotton and curaua fibers, are used to prepare nanofibers for use in thermoplastic films, where they are combined with polymeric matrices, and in biomedical applications such as tissue engineering, amongst other applications. The development of products containing nanofibers offers a promising alternative for the use of agricultural products, adding value to the chains of production. However, the emergence of new nanotechnological products demands that their risks to human health and the environment be evaluated. This has resulted in the creation of the new area of nanotoxicology, which addresses the toxicological aspects of these materials. Contributing to these developments, the present work involved a genotoxicological study of different nanofibers, employing chromosomal aberration and comet assays, as well as cytogenetic and molecular analyses, to obtain preliminary information concerning nanofiber safety. The methodology consisted of exposure of Allium cepa roots, and animal cell cultures (lymphocytes and fibroblasts), to different types of nanofibers. Negative controls, without nanofibers present in the medium, were used for comparison. The nanofibers induced different responses according to the cell type used. In plant cells, the most genotoxic nanofibers were those derived from green, white, and brown cotton, and curaua, while genotoxicity in animal cells was observed using nanofibers from brown cotton and curaua. An important finding was that ruby cotton nanofibers did not cause any significant DNA breaks in the cell types employed. This work demonstrates the feasibility of determining the genotoxic potential of nanofibers derived from plant cellulose to obtain information vital both for the future usage of these materials in agribusiness and for an understanding of their environmental

  17. Cells behaviors and genotoxicity on topological surface

    International Nuclear Information System (INIS)

    Yang, N.; Yang, M.K.; Bi, S.X.; Chen, L.; Zhu, Z.Y.; Gao, Y.T.; Du, Z.

    2013-01-01

    To investigate different cells behaviors and genotoxicity, which were driven by specific microenvironments, three patterned surfaces (pillars, wide grooves and narrow grooves) and one smooth surface were prepared by template-based technique. Vinculin is a membrane-cytoskeletal protein in focal adhesion plaques and associates with cell–cell and cell–matrix junctions, which can promote cell adhesion and spreading. The immunofluorescence staining of vinculin revealed that the narrow grooves patterned substrate was favorable for L929 cell adhesion. For cell multiplication, the narrow grooves surface was fitted for the proliferation of L929, L02 and MSC cells, the pillars surface was only in favor of L929 cells to proliferate during 7 days of cell cultivation. Cell genetic toxicity was evaluated by cellular micronuclei test (MNT). The results indicated that topological surfaces were more suitable for L929 cells to proliferate and maintain the stability of genome. On the contrary, the narrow grooves surface induced higher micronuclei ratio of L02 and MSC cells than other surfaces. With the comprehensive results of cell multiplication and MNT, it was concluded that the wide grooves surface was best fitted for L02 cells to proliferate and have less DNA damages, and the smooth surface was optimum for the research of MSC cells in vitro. - Highlights: • Different cells behaviors on microstructure surfaces were discussed in this paper. • The expression of cell protein of Vinculin was studied in this research. • Cellular micronuclei test was applied to evaluate cells' genotoxicity. • Cell genotoxicity was first studied in the research field of topological surfaces

  18. Human biological monitoring of occupational genotoxic exposures

    DEFF Research Database (Denmark)

    Knudsen, Lisbeth E.; Sorsa, M

    1993-01-01

    Human biological monitoring is a valuable tool for exposure assessment in groups of persons occupationally exposed to genotoxic agents. If the monitoring activity covers genetic material the term genetic monitoring is used. The methods used for genetic monitoring are either substance specific, e.......g. the quantitation of identified DNA-adducts or substance unspecific as is the measurement of DNA-repair. The sample material used for analysis must be well characterized and subject to uniform processing for comparison of the results. Confounding factors of smoking, age and sex must be well controlled...

  19. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  20. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  1. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  2. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  4. Open Syllable Once Again. Endogenous or Exogenous?

    Directory of Open Access Journals (Sweden)

    Raffaele Caldarelli

    2013-02-01

    Full Text Available After a brief reply to some critical remarks raised by Mario Enrietti in a paper published in “Studi Slavistici”, VI (2009, the Author tries to explain why Enrietti’s theory of an exogenous, namely Romance origin of the Slavic open syllable structure should be rejected.

  5. Exogenous fibrolytic enzymes to unlock nutrients: Histological ...

    African Journals Online (AJOL)

    There is a need for a better understanding of the mode-of-action of exogenous fibrolytic enzymes (EFE) used as additives in ruminant feeds. Four forages, treated with EFE, were evaluated in vitro and histologically, in an attempt to determine the effect of EFE on tissue degradation. Weeping love grass, kikuyu leaf material, ...

  6. integrating indigenous and exogenous communication channels

    African Journals Online (AJOL)

    Prof. Adipala Ekwamu

    of how endogenous and exogenous communication channels can effectively complement each other to enhance success. Mass media such as radio, newspapers and television are generally the least expensive media for transmitting messages to large numbers of people (Van den Ban and Hawkins, 1996). Mass.

  7. Carbon black nanoparticle instillation induces sustained inflammation and genotoxicity in mouse lung and liver

    DEFF Research Database (Denmark)

    Bourdon, Julie A; Saber, Anne T; Jacobsen, Nicklas R

    2012-01-01

    Widespread occupational exposure to carbon black nanoparticles (CBNPs) raises concerns over their safety. CBNPs are genotoxic in vitro but less is known about their genotoxicity in various organs in vivo.......Widespread occupational exposure to carbon black nanoparticles (CBNPs) raises concerns over their safety. CBNPs are genotoxic in vitro but less is known about their genotoxicity in various organs in vivo....

  8. Genotoxicity tests on D-tagatose.

    Science.gov (United States)

    Kruger, C L; Whittaker, M H; Frankos, V H

    1999-04-01

    D-tagatose is a low-calorie sweetener that tastes like sucrose. Its genotoxic potential was examined in five standard assays: the Ames Salmonella typhimurium reverse mutation assay, the Escherichia coli/mammalian microsome assay, a chromosomal aberration assay in Chinese hamster ovary cells, a mouse lymphoma forward mutation assay, and an in vivo mouse micronucleus assay. D-tagatose was not found to increase the number of revertants per plate relative to vehicle controls in either the S. typhimurium tester strains or the WP2uvrA- tester strain with or without metabolic activation at doses up to 5000 microg/plate. No significant increase in Chinese hamster ovary cells with chromosomal aberrations was observed at concentrations up to 5000 microg/ml with or without metabolic activation. D-tagatose was not found to increase the mutant frequency in mouse lymphoma L5178Y cells with or without metabolic activation up to concentrations of 5000 microg/ml. D-tagatose caused no significant increase in micronuclei in bone marrow polychromatic erythrocytes at doses up to 5000 mg/kg. D-tagatose was not found to be genotoxic under the conditions of any of the assays described above. Copyright 1999 Academic Press.

  9. Genotoxicity of sludges, wastewater and effluents from three different industries

    Energy Technology Data Exchange (ETDEWEB)

    Krishnamurthi, K.; Saravana Devi, S.; Kumar, Koel; Dutta, Dipanwita; Muhil Vannan, S.; Subin, T.S.; Yadav, R.R.; Chakrabarti, T. [National Environmental Engineering Research Institute (NEERI), Environmental Biotechnology Division, Nagpur (India); Hengstler, J.G.; Hermes, Matthias [Leibniz Research Centre for Working Environment and Human Factors at the University of Dortmund (IfADo), Dortmund (Germany)

    2008-12-15

    Many surface waters in Europe, Asia and South America have been reported to be contaminated with genotoxic substances. Therefore, it is important to establish strategies for identification of the most critical sources. In this study, we used a battery of four genotoxicity assays namely chromosomal aberration, DNA strand break, DNA laddering and P53 accumulation tests in mononuclear blood cells. Before cleaning of wastewater high levels of genotoxic contamination could be observed. For instance, we observed an increase in chromosomal aberrations from 2.6{+-}1.1 (aberrant cells in %; control), to 33.6{+-}6.6 in a petrochemical plant, 29.4{+-}3.3 in a petroleum refinery and 14.4{+-}1.8 in a coke plant of steel industry. A good correlation between the four assays was found. The most sensitive and reproducible results were obtained with the chromosomal aberration assay. Interestingly, clear differences in the efficiency of wastewater cleaning in three different treatment plants were observed. The first and second treatment plants in petrochemical industry and coke plant of steel industry completely eliminated genotoxicity of the wastewater. However, the third plant in petroleum refinery could achieve a reduction in genotoxicity but significant genotoxic contaminations were still present. In conclusion, our battery of genotoxicity tests allows the identification of critical sources contributing to contamination of surface waters. (orig.)

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Low concentration of exogenous carbon monoxide protects mammalian cells against proliferation induced by radiation-induced bystander effect

    Energy Technology Data Exchange (ETDEWEB)

    Tong, Liping [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Yu, K.N. [Department of Physics and Materials Science, City University of Hong Kong, Tat Chee Avenue, Kowloon Tong (Hong Kong); Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Bao, Lingzhi; Wu, Wenqing; Wang, Hongzhi [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Han, Wei, E-mail: hanw@hfcas.cn [Center of Medical Physics and Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China)

    2014-01-15

    Highlights: • We show the possibility of modulate proliferation induced by radiation-induced bystander effect with low concentration carbon monoxide. • Carbon monoxide inhibited proliferation via modulating the transforming growth factor β1 (TGF-β1)/nitric oxide (NO) signaling pathway. • Exogenous carbon monoxide has potential application in clinical radiotherapy. - Abstract: Radiation-induced bystander effect (RIBE) has been proposed to have tight relationship with the irradiation-caused secondary cancers beyond the irradiation-treated area after radiotherapy. Our previous studies demonstrated a protective effect of low concentration carbon monoxide (CO) on the genotoxicity of RIBE after α-particle irradiation. In the present work, a significant inhibitory effect of low-dose exogenous CO, generated by tricarbonyldichlororuthenium (II) dimer [CO-releasing molecule (CORM-2)], on both RIBE-induced proliferation and chromosome aberration was observed. Further studies on the mechanism revealed that the transforming growth factor β1/nitric oxide (NO) signaling pathway, which mediated RIBE signaling transduction, could be modulated by CO involved in the protective effects. Considering the potential of exogenous CO in clinical applications and its protective effect on RIBE, the present work aims to provide a foundation for potential application of CO in radiotherapy.

  13. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...

  14. Gas in Attack and Gas in Defense

    National Research Council Canada - National Science Library

    Fries, Amos A

    1919-01-01

    Carrying out a gas attack is the most technical and dangerous of war's attacks, not only to those on board the airplane that is initiating the attack, but also to those friendly troops on the ground for miles around...

  15. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  16. Pyrrolizidine alkaloids--genotoxicity, metabolism enzymes, metabolic activation, and mechanisms.

    Science.gov (United States)

    Fu, Peter P; Xia, Qingsu; Lin, Ge; Chou, Ming W

    2004-02-01

    Pyrrolizidine alkaloid-containing plants are widely distributed in the world and are probably the most common poisonous plants affecting livestock, wildlife, and humans. Because of their abundance and potent toxicities, the mechanisms by which pyrrolizidine alkaloids induce genotoxicities, particularly carcinogenicity, were extensively studied for several decades but not exclusively elucidated until recently. To date, the pyrrolizidine alkaloid-induced genotoxicities were revealed to be elicited by the hepatic metabolism of these naturally occurring toxins. In this review, we present updated information on the metabolism, metabolizing enzymes, and the mechanisms by which pyrrolizidine alkaloids exert genotoxicity and tumorigenicity.

  17. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  18. Endogenous vs. exogenous regulations in the commons

    DEFF Research Database (Denmark)

    Abatayo, Anna Lou; Lynham, John

    2016-01-01

    potential confounds in previous experiments. A key feature of our experimental design is to have the exact same regulations chosen endogenously as those that are imposed exogenously. When we compare the same regulations chosen endogenously to those externally imposed, we observe no differences in extraction...... levels among CPR users in a laboratory experiment. We also observe no differences between weak external regulations and no regulations, after controlling for a potential confound. However, when we add communication to our endogenous treatment, we observe significant behavioral differences between...... endogenous regulations with communication and exogenous regulations without communication. Our results suggest that externally imposed regulations do not crowd out intrinsic motivations in the lab and they confirm that communication facilitates cooperation to reduce extraction....

  19. Evaluation of the genotoxicity of cellulose nanofibers

    Directory of Open Access Journals (Sweden)

    de Lima R

    2012-07-01

    plant cells, the most genotoxic nanofibers were those derived from green, white, and brown cotton, and curaua, while genotoxicity in animal cells was observed using nanofibers from brown cotton and curaua. An important finding was that ruby cotton nanofibers did not cause any significant DNA breaks in the cell types employed.Conclusion: This work demonstrates the feasibility of determining the genotoxic potential of nanofibers derived from plant cellulose to obtain information vital both for the future usage of these materials in agribusiness and for an understanding of their environmental impacts.Keywords: cotton, curaua, nanotoxicology, environmental nanotechnology

  20. Is the natural rate of growth exogenous?

    OpenAIRE

    Miguel Leon-Ledesma; Anthony P. Thirlwall

    2000-01-01

    In mainstream growth theory, including endogenous growth theory, the naturalrate of growth as defined by Harrod, is still treated as exogenous. In practice, however, both the growth of the labour force and the growth of labour productivity are endogenous to demand. This has theoretical implications for the adjustment process between the actual, warranted and natural growth rates. It also has serious implications for the way in which the growth process is viewed: whether from the supply side o...

  1. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  3. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... in panic attacks. For example, if a grizzly bear came after you, your body would react instinctively. ... panic disorder Major life stress, such as the death or serious illness of a loved one A ...

  4. The absence of genotoxicity of sucralose.

    Science.gov (United States)

    Brusick, D; Grotz, V L; Slesinski, R; Kruger, C L; Hayes, A W

    2010-11-01

    Sucralose is a non-nutritive sweetener that is approximately 600 times sweeter than table sugar. It is currently approved for use in over 80 countries. Evidence from chronic studies demonstrates that this compound is not carcinogenic. This report summarizes the results of genotoxicity studies that were part of the original safety assessment of sucralose-conducted early in the safety investigation and shared with regulatory agencies around the world. Studies included the Ames (Salmonella typhimurium) reverse mutation test, the Escherichia coli pol A+/A- test, an in vitro chromosome damage assay in human lymphocytes, mutation in TK +/- mouse lymphoma cells, an in vivo chromosome aberration test in rats and two separate micronucleus tests in mice. All results were evaluated as negative. These results support the overall conclusion by regulatory and heath agencies that sucralose is safe for its intended use. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. Human biological monitoring of occupational genotoxic exposures

    DEFF Research Database (Denmark)

    Knudsen, Lisbeth E.; Sorsa, M

    1993-01-01

    ) occupational exposure limit value of styrene in ambient air. The consideration of ethical issues in human genetic monitoring is an important but often overlooked aspect. This includes the scientific and preventional relevance of performing a test on individuals, pre- and post study information of donors......Human biological monitoring is a valuable tool for exposure assessment in groups of persons occupationally exposed to genotoxic agents. If the monitoring activity covers genetic material the term genetic monitoring is used. The methods used for genetic monitoring are either substance specific, e.......g. the quantitation of identified DNA-adducts or substance unspecific as is the measurement of DNA-repair. The sample material used for analysis must be well characterized and subject to uniform processing for comparison of the results. Confounding factors of smoking, age and sex must be well controlled...

  6. In vitro evaluation of mutagenicity and genotoxicity of sitagliptin ...

    African Journals Online (AJOL)

    In vitro evaluation of mutagenicity and genotoxicity of sitagliptin alone and in combination with artificial sweeteners. Komal Najam, Imran Altaf, M Ashraf, M. Adil Rasheed, Faiza Saleem, Neelma Munir, Rasheeda Bashir ...

  7. Titanium dioxide nanoparticles cause genotoxicity in human lung epithelial cells

    Science.gov (United States)

    The use of engineered nanoparticles in consumer products is steadily increasing. However, the health effects of exposure to these nanoparticles are not thoroughly understood. This study investigated the genotoxicity of six titanium dioxide and two cerium oxide nanoparticles of va...

  8. THE GENOTOXICITY OF AMBIENT OUTDOOR AIR, A REVIEW: SALMONELLA MUTAGENICITY

    Science.gov (United States)

    The genotoxicity of ambient outdoor air, a review: Salmonella mutagenicityAbstractMutagens in urban air pollution come from anthropogenic sources (especially combustion sources) and are products of airborne chemical reactions. Bacterial mutation tests have been used ...

  9. Genotoxic consequences of endogenous aldehydes on mouse haematopoietic stem cell function.

    Science.gov (United States)

    Garaycoechea, Juan I; Crossan, Gerry P; Langevin, Frederic; Daly, Maria; Arends, Mark J; Patel, Ketan J

    2012-09-27

    Haematopoietic stem cells (HSCs) regenerate blood cells throughout the lifespan of an organism. With age, the functional quality of HSCs declines, partly owing to the accumulation of damaged DNA. However, the factors that damage DNA and the protective mechanisms that operate in these cells are poorly understood. We have recently shown that the Fanconi anaemia DNA-repair pathway counteracts the genotoxic effects of reactive aldehydes. Mice with combined inactivation of aldehyde catabolism (through Aldh2 knockout) and the Fanconi anaemia DNA-repair pathway (Fancd2 knockout) display developmental defects, a predisposition to leukaemia, and are susceptible to the toxic effects of ethanol-an exogenous source of acetaldehyde. Here we report that aged Aldh2(-/-) Fancd2(-/-) mutant mice that do not develop leukaemia spontaneously develop aplastic anaemia, with the concomitant accumulation of damaged DNA within the haematopoietic stem and progenitor cell (HSPC) pool. Unexpectedly, we find that only HSPCs, and not more mature blood precursors, require Aldh2 for protection against acetaldehyde toxicity. Additionally, the aldehyde-oxidizing activity of HSPCs, as measured by Aldefluor stain, is due to Aldh2 and correlates with this protection. Finally, there is more than a 600-fold reduction in the HSC pool of mice deficient in both Fanconi anaemia pathway-mediated DNA repair and acetaldehyde detoxification. Therefore, the emergence of bone marrow failure in Fanconi anaemia is probably due to aldehyde-mediated genotoxicity restricted to the HSPC pool. These findings identify a new link between endogenous reactive metabolites and DNA damage in HSCs, and define the protective mechanisms that counteract this threat.

  10. Genotoxic and antimicrobial studies of the leaves of Psidium guajava

    OpenAIRE

    Nwannemka Lauretta Ofodile; Ndubuisi Moses Chikere Nwakanma; Michael Mordi; Oluwakemi Ademolu; Isabella Ezimoke; Jokotade Owoso

    2013-01-01

    Background: The guava, Psidium guajava is one of the most gregarious of fruit trees, of the Myrtaceae family. The leaf of P. guajava is a common herb used in the treatment of diarrhea in Nigeria and this has generated special interest in the probable antimicrobial and genotoxic effects of the leaf. However the mode of action of the leaf extracts has not been reported, hence the genotoxicity study. Materials and Methods: Antimicrobial activity of the aqueous and ethanolic extracts of the le...

  11. Controversial Effects of Exogenous Testosterone on Cardiovascular Diseases.

    Science.gov (United States)

    Al-Khazaali, Ali; Arora, Rohit; Muttar, Saad

    The use of testosterone (T) among men aged 40 years or older was increased more than 3 times from 0.81% in 2001 to 2.91% in 2011. Until recently, the majority of the studies did not show any increased cardiovascular (CV) risk by using T in male patients with hypogonadism. What is more, some studies had observed a protective effect of using T against CV diseases. However, in 2010, a randomized clinical trial (RCT) was intended to study the advantage of T gel in older men with limitations in mobility; the study was stopped due to unexpected high prevalence of CV adverse outcome. These findings were confirmed by 2 other studies published in November of 2013 and January of 2014. Consequently, the Food and Drug Administration (FDA) had announced in January 2014 that it will reassess the safety of those treatments. Meanwhile, the agency had not reached to a definitive conclusion that FDA-approved testosterone therapy raises the risk of stroke, heart attack, or death. A report released in the broadcast of the NBC Nightly News in September of this year that the FDA says "there's little evidence that T boosting drugs taken by millions of American men are actually effective." NBC notes that the agency also pointed out that it was not convinced that they carry serious risk either. "The condition has been marketed as low 'T', and the medications are offered to help with low sex drive and fatigue among some men," notes NBC. The European Medicines Agency EMA's Pharmacovigilance Risk Assessment Committee has also responded to the concern of potential CV adverse outcomes associated with the use of T, and they have concluded in their October meeting of this year that the use of T in men who do not produce enough T raises the risk of heart diseases. In our review, we highlighted the association between exogenous T and major adverse CV outcomes. Additionally, we focused on the interplay between exogenous T and some endocrine abnormalities such as diabetes mellitus type 2, metabolic

  12. Genotoxicity testing: progress and prospects for the next decade.

    Science.gov (United States)

    Turkez, Hasan; Arslan, Mehmet E; Ozdemir, Ozlem

    2017-10-01

    Genotoxicity and mutagenicity analyses have a significant role in the identification of hazard effects of therapeutic drugs, cosmetics, agrochemicals, industrial compounds, food additives, natural toxins and nanomaterials for regulatory purposes. To evaluate mutagenicity or genotoxicity, different in vitro and in vivo methodologies exert various genotoxicological endpoints such as point mutations, changes in number and structure of chromosomes. Areas covered: This review covered the basics of genotoxicity and in vitro/in vivo methods for determining of genetic damages. The limitations that have arisen as a result of the common use of these methods were also discussed. Finally, the perspectives of further prospects on the use of genotoxicity testing and genotoxic mode of action were emphasized. Expert opinion: The solution of actual and practical problems of genetic toxicology is inarguably based on the understanding of DNA damage mechanisms at molecular, subcellular, cellular, organ, system and organism levels. Current strategies to investigate human health risks should be modified to increase their performance for more reliable results and also new techniques such as toxicogenomics, epigenomics and single cell approaches must be integrated into genetic safety evolutions. The explored new biomarkers by the omic techniques will provide forceful genotoxicity assessment to reduce the cancer risk.

  13. Genotoxicity of aflatoxins and their precursors in human cells.

    Science.gov (United States)

    Theumer, M G; Henneb, Y; Khoury, L; Snini, S P; Tadrist, S; Canlet, C; Puel, O; Oswald, I P; Audebert, M

    2018-05-01

    Aflatoxins are found as food contaminant and some of them demonstrate a carcinogenic effect. The aflatoxins biosynthetic pathway involves 15 successive steps. The aim of this study was to compare the toxicity of aflatoxins and their precursors in three human cell lines. We tested the four aflatoxins and two of their metabolites; three early metabolic precursors and two late biosynthetic precursors. Cyclopiazonic acid, synthesized in parallel with aflatoxins, was also tested. The cytotoxicity and the genotoxicity was evaluated with the γH2AX assay in three human cell lines with different bioactivation capacities. Our results indicated that the most genotoxic chemicals in the three cell lines were in decreasing order sterigmatocystin (ST), aflatoxin B1 (AFB1), aflatoxicol (AFL), aflatoxin G1 (AFG1) and versicolorin A (VERA). Aflatoxin M1 (AFM1) demonstrated genotoxic property in only one cell line. The other tested compounds did not demonstrate any genotoxic activity. Overall, our results suggested different genotoxic mechanisms of action for the tested compounds, involving specific bioactivation pathways. Moreover, some metabolic precursors of aflatoxins demonstrated genotoxic potential equivalent or greater to AFB1. This should be taking into account for the development of new strategies intended to reduce the aflatoxins exposure and for human risk assessment. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Genotoxicity study of photolytically treated 2-chloropyridine aqueous solutions

    International Nuclear Information System (INIS)

    Vlastos, Dimitris; Skoutelis, Charalambos G.; Theodoridis, Ioannis T.; Stapleton, David R.; Papadaki, Maria I.

    2010-01-01

    2-Chloropyridine (2-CPY) has been identified as a trace organic chemical in process streams, wastewater and even drinking water. Furthermore, it appears to be formed as a secondary pollutant during the decomposition of specific insecticides. As reported in our previous work, 2-CPY was readily removed and slowly mineralised when subjected to ultraviolet (UV) irradiation at 254 nm. Moreover, 2-CPY was found to be genotoxic at 100 μg ml -1 but it was not genotoxic at or below 50 μg ml -1 . In this work 2-CPY aqueous solutions were treated by means of UV irradiation at 254 nm. 2-CPY mineralisation history under different conditions is shown. 2-CPY was found to mineralise completely upon prolonged irradiation. Identified products of 2-CPY photolytic decomposition are presented. Solution genotoxicity was tested as a function of treatment time. Aqueous solution samples, taken at different photo-treatment times were tested in cultured human lymphocytes applying the cytokinesis block micronucleus (CBMN) assay. It was found that the solution was genotoxic even when 2-CPY had been practically removed. This shows that photo-treatment of 2-CPY produces genotoxic products. Upon prolonged irradiation solution genotoxicity values approached the control value.

  15. Genotoxicity study of photolytically treated 2-chloropyridine aqueous solutions

    Energy Technology Data Exchange (ETDEWEB)

    Vlastos, Dimitris, E-mail: dvlastos@cc.uoi.gr [Department of Environmental and Natural Resources Management, University of Ioannina, Seferi 2, Agrinio 30100 (Greece); Skoutelis, Charalambos G.; Theodoridis, Ioannis T. [Department of Environmental and Natural Resources Management, University of Ioannina, Seferi 2, Agrinio 30100 (Greece); Stapleton, David R. [Chemical Engineering, IPSE, School of Process Environmental and Materials Engineering, University of Leeds, Leeds LS2 9JT (United Kingdom); Papadaki, Maria I. [Department of Environmental and Natural Resources Management, University of Ioannina, Seferi 2, Agrinio 30100 (Greece); Chemical Engineering, IPSE, School of Process Environmental and Materials Engineering, University of Leeds, Leeds LS2 9JT (United Kingdom)

    2010-05-15

    2-Chloropyridine (2-CPY) has been identified as a trace organic chemical in process streams, wastewater and even drinking water. Furthermore, it appears to be formed as a secondary pollutant during the decomposition of specific insecticides. As reported in our previous work, 2-CPY was readily removed and slowly mineralised when subjected to ultraviolet (UV) irradiation at 254 nm. Moreover, 2-CPY was found to be genotoxic at 100 {mu}g ml{sup -1} but it was not genotoxic at or below 50 {mu}g ml{sup -1}. In this work 2-CPY aqueous solutions were treated by means of UV irradiation at 254 nm. 2-CPY mineralisation history under different conditions is shown. 2-CPY was found to mineralise completely upon prolonged irradiation. Identified products of 2-CPY photolytic decomposition are presented. Solution genotoxicity was tested as a function of treatment time. Aqueous solution samples, taken at different photo-treatment times were tested in cultured human lymphocytes applying the cytokinesis block micronucleus (CBMN) assay. It was found that the solution was genotoxic even when 2-CPY had been practically removed. This shows that photo-treatment of 2-CPY produces genotoxic products. Upon prolonged irradiation solution genotoxicity values approached the control value.

  16. Genotoxicity study of photolytically treated 2-chloropyridine aqueous solutions.

    Science.gov (United States)

    Vlastos, Dimitris; Skoutelis, Charalambos G; Theodoridis, Ioannis T; Stapleton, David R; Papadaki, Maria I

    2010-05-15

    2-Chloropyridine (2-CPY) has been identified as a trace organic chemical in process streams, wastewater and even drinking water. Furthermore, it appears to be formed as a secondary pollutant during the decomposition of specific insecticides. As reported in our previous work, 2-CPY was readily removed and slowly mineralised when subjected to ultraviolet (UV) irradiation at 254 nm. Moreover, 2-CPY was found to be genotoxic at 100 microg ml(-1) but it was not genotoxic at or below 50 microg ml(-1). In this work 2-CPY aqueous solutions were treated by means of UV irradiation at 254 nm. 2-CPY mineralisation history under different conditions is shown. 2-CPY was found to mineralise completely upon prolonged irradiation. Identified products of 2-CPY photolytic decomposition are presented. Solution genotoxicity was tested as a function of treatment time. Aqueous solution samples, taken at different photo-treatment times were tested in cultured human lymphocytes applying the cytokinesis block micronucleus (CBMN) assay. It was found that the solution was genotoxic even when 2-CPY had been practically removed. This shows that photo-treatment of 2-CPY produces genotoxic products. Upon prolonged irradiation solution genotoxicity values approached the control value. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  17. Genotoxicity evaluation of alpha-linolenic acid-diacylglycerol oil

    Directory of Open Access Journals (Sweden)

    Hiroshi Honda

    Full Text Available The alpha-linolenic acid (ALA-diacylglycerol (DAG oil is an edible oil enriched with DAG (>80% and ALA (>50%. Although DAG oil, which mainly consists of oleic and linoleic acids has no genotoxic concerns, the fatty acid composition could affect the chemical property of DAG. Therefore, the purpose of this study was to evaluate the genotoxicity of ALA-DAG oil using standard genotoxicity tests in accordance with the OECD guidelines. ALA-DAG oil showed negative results in the bacterial reverse mutation test (Ames test and in vitro micronucleus test in cultured Chinese hamster lung cells with and without metabolic activation, and in the in vivo bone marrow micronucleus test in mice. Our results did not show any genotoxicity, suggesting that the fatty acid composition had no deleterious effects. We conclude that ALA-DAG oil had no genotoxicity concerns under the testing conditions. Keywords: Alpha-linolenic acid-rich diacylglycerol, Diacylglycerol, Alpha-linolenic acid, Fatty acid composition, Genotoxicity

  18. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  19. Endogenous and exogenous factors in national development ...

    African Journals Online (AJOL)

    Endogenous and exogenous factors in national development: inferences from the metaphor of witchcraft (Àjé) in Olátúbòsún. Oládàpò's poetry. This work engages political commentary in the work of Olátúbòsún Oládàpò, a Yorùbá poet. Its focus is on the way that political ideas and values that are rooted in Nigerian culture ...

  20. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  1. Silver nanoparticles: correlating nanoparticle size and cellular uptake with genotoxicity

    Science.gov (United States)

    Butler, Kimberly S.; Peeler, David J.; Casey, Brendan J.; Dair, Benita J.; Elespuru, Rosalie K.

    2015-01-01

    The focus of this research was to develop a better understanding of the pertinent physico-chemical properties of silver nanoparticles (AgNPs) that affect genotoxicity, specifically how cellular uptake influences a genotoxic cell response. The genotoxicity of AgNPs was assessed for three potential mechanisms: mutagenicity, clastogenicity and DNA strand-break-based DNA damage. Mutagenicity (reverse mutation assay) was assessed in five bacterial strains of Salmonella typhimurium and Echerichia coli, including TA102 that is sensitive to oxidative DNA damage. AgNPs of all sizes tested (10, 20, 50 and 100nm), along with silver nitrate (AgNO3), were negative for mutagenicity in bacteria. No AgNPs could be identified within the bacteria cells using transmission electron microscopy (TEM), indicating these bacteria lack the ability to actively uptake AgNPs 10nm or larger. Clastogenicity (flow cytometry-based micronucleus assay) and intermediate DNA damage (DNA strand breaks as measured in the Comet assay) were assessed in two mammalian white blood cell lines: Jurkat Clone E6-1 and THP-1. It was observed that micronucleus and Comet assay end points were inversely correlated with AgNP size, with smaller NPs inducing a more genotoxic response. TEM results indicated that AgNPs were confined within intracellular vesicles of mammalian cells and did not penetrate the nucleus. The genotoxicity test results and the effect of AgNO3 controls suggest that silver ions may be the primary, and perhaps only, cause of genotoxicity. Furthermore, since AgNO3 was not mutagenic in the gram-negative bacterial Ames strains tested, the lack of bacterial uptake of the AgNPs may not be the major reason for the lack of genotoxicity observed. PMID:25964273

  2. The Genotoxicity of Vitamin C in vitro

    Directory of Open Access Journals (Sweden)

    Hilada Nefić

    2008-05-01

    Full Text Available The genotoxic effects of Vitamin C (ascorbic acid on human lymphocytes in vitro were estimated by analyzing and identifying various chromosome abnormalities, in relation to the concentration of Vitamin C. Testing concentrations of Vitamin C induced different aberrations including the impairment of spindle function. The spindle disturbances can result in mitotic arrest, multipolar spindles and multipolar segregation, errors in chromosome segregation, formation of chromosome bridges and chromosome laggards. The most frequent irregularities were found in anaphase and telophase. A certain number of lymphocytes were arrested at anaphase or telophase (in colchicine-untreated cultures of human lymphocytes. Testing concentrations of ascorbic acid did not induce a significant increase in the number of aneuploid mitoses and were not clastogenic except at the highest concentration (1,000 μg/ml in colchicine-treated cultures, and in colchicine-untreated cultures of human lymphocytes the pulverization of chromosome was observed. Vitamin C changed the mitotic index value of lymphocytes notably at the higher concentrations (250, 500 and 1,000 μg/ml.

  3. DNA dosimetry assessment for sunscreen genotoxic photoprotection.

    Directory of Open Access Journals (Sweden)

    André Passaglia Schuch

    Full Text Available Due to the increase of solar ultraviolet radiation (UV incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter.The Sun Protection Factor for DNA (DNA-SPF is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF. Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations.The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage.

  4. DNA dosimetry assessment for sunscreen genotoxic photoprotection.

    Science.gov (United States)

    Schuch, André Passaglia; Lago, Juliana Carvalhães; Yagura, Teiti; Menck, Carlos Frederico Martins

    2012-01-01

    Due to the increase of solar ultraviolet radiation (UV) incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter. The Sun Protection Factor for DNA (DNA-SPF) is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD) and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF). Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations. The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage.

  5. Genotoxicity of Graphene in Escherichia coli

    Science.gov (United States)

    Sharma, Ananya

    Rapid advances in nanotechnology necessitate assessment of the safety of nanomaterials in the resulting products and applications. One key nanomaterial attracting much interest in many areas of science and technology is graphene. Graphene is a one atom thick carbon allotrope arranged in a two-dimensional honeycomb lattice. In addition to being extremely thin, graphene has several extraordinary physical properties such as its exceptional mechanical strength, thermal stability, and high electrical conductivity. Graphene itself is relatively chemically inert and therefore pristine graphene must undergo a process called functionalization, which is combination of chemical and physical treatments that change the properties of graphene, to make it chemically active. Functionalization of graphene is of crucial importance as the end application of graphene depends on proper functionalization. In the field of medicine, graphene is currently a nanomaterial of high interest for building biosensors, DNA transistors, and probes for cancer detection. Despite the promising applications of graphene in several areas of biomedicine, there have been only few studies in recent years that focus on evaluating cytotoxicity of graphene on cells, and almost no studies that investigate how graphene exposure affects cellular genetic material. Therefore, in this study we used a novel approach to evaluate the genotoxicity, i.e., the effects of graphene on DNA, using Escherichia coli as a prokaryotic model organism.

  6. DNA Dosimetry Assessment for Sunscreen Genotoxic Photoprotection

    Science.gov (United States)

    Schuch, André Passaglia; Lago, Juliana Carvalhães; Yagura, Teiti; Menck, Carlos Frederico Martins

    2012-01-01

    Background Due to the increase of solar ultraviolet radiation (UV) incidence over the last few decades, the use of sunscreen has been widely adopted for skin protection. However, considering the high efficiency of sunlight-induced DNA lesions, it is critical to improve upon the current approaches that are used to evaluate protection factors. An alternative approach to evaluate the photoprotection provided by sunscreens against daily UV radiation-induced DNA damage is provided by the systematic use of a DNA dosimeter. Methodology/Principal Findings The Sun Protection Factor for DNA (DNA-SPF) is calculated by using specific DNA repair enzymes, and it is defined as the capacity for inhibiting the generation of cyclobutane pyrimidine dimers (CPD) and oxidised DNA bases compared with unprotected control samples. Five different commercial brands of sunscreen were initially evaluated, and further studies extended the analysis to include 17 other products representing various formulations and Sun Protection Factors (SPF). Overall, all of the commercial brands of SPF 30 sunscreens provided sufficient protection against simulated sunlight genotoxicity. In addition, this DNA biosensor was useful for rapidly screening the biological protection properties of the various sunscreen formulations. Conclusions/Significance The application of the DNA dosimeter is demonstrated as an alternative, complementary, and reliable method for the quantification of sunscreen photoprotection at the level of DNA damage. PMID:22768281

  7. Genotoxic damage in auto body shop workers.

    Science.gov (United States)

    Siebel, Anna Maria; Basso da Silva, Luciano

    2010-10-01

    Some studies have shown increased DNA damage among car painters, but other professionals working in auto body and paint shops have not been extensively assessed. The aim of this study was to assess DNA damage in different types of auto body shop workers by measuring micronucleus (MN) levels in exfoliated buccal cells. The mean number of cells with MN per 2000 exfoliated buccal cells was analyzed in three groups of male workers: auto body repair technicians, painters, and office workers (control group). All participants answered a questionnaire inquiring about age, smoking habits, alcohol consumption, work practices, occupational exposure time, job activities, and use of protective equipment. The mean number of cells with MN was 3.50 ± 1.50 in auto body painters, 3.91 ± 2.10 in auto body repair technicians, and 0.80 ± 0.78 in office workers, with a significant difference between the control group and the two other groups (p = 0.0001). Age, occupational exposure time, use of protective masks, alcohol consumption, and smoking habit did not affect MN results. The findings indicate that technicians and painters working in auto body shops are at risk for genotoxic damage, while office workers seem to be protected.

  8. Genotoxic effects of zinc oxide nanoparticles

    Science.gov (United States)

    Heim, Julia; Felder, Eva; Tahir, Muhammad Nawaz; Kaltbeitzel, Anke; Heinrich, Ulf Ruediger; Brochhausen, Christoph; Mailänder, Volker; Tremel, Wolfgang; Brieger, Juergen

    2015-05-01

    The potential toxicity of nanoparticles has currently provoked public and scientific discussions, and attempts to develop generally accepted handling procedures for nanoparticles are under way. The investigation of the impact of nanoparticles on human health is overdue and reliable test systems accounting for the special properties of nanomaterials must be developed. Nanoparticular zinc oxide (ZnO) may be internalised through ambient air or the topical application of cosmetics, only to name a few, with unpredictable health effects. Therefore, we analysed the determinants of ZnO nanoparticle (NP) genotoxicity. ZnO NPs (15-18 nm in diameter) were investigated at concentrations of 0.1, 10 and 100 μg mL-1 using the cell line A549. Internalised NPs were only infrequently detectable by TEM, but strongly increased Zn2+ levels in the cytoplasm and even more in the nuclear fraction, as measured by atom absorption spectroscopy, indicative of an internalised zinc and nuclear accumulation. We observed a time and dosage dependent reduction of cellular viability after ZnO NP exposure. ZnCl2 exposure to cells induced similar impairments of cellular viability. Complexation of Zn2+ with diethylene triamine pentaacetic acid (DTPA) resulted in the loss of toxicity of NPs, indicating the relevant role of Zn2+ for ZnO NP toxicity. Foci analyses showed the induction of DNA double strand breaks (DSBs) by ZnO NPs and increased intracellular reactive oxygen species (ROS) levels. Treatment of the cells with the ROS scavenger N-acetyl-l-cysteine (NAC) resulted in strongly decreased intracellular ROS levels and reduced DNA damage. However, a slow increase of ROS after ZnO NP exposure and reduced but not quashed DSBs after NAC-treatment suggest that Zn2+ may exert genotoxic activities without the necessity of preceding ROS-induction. Our data indicate that ZnO NP toxicity is a result of cellular Zn2+ intake. Subsequently increased ROS-levels cause DNA damage. However, we found evidence for

  9. Bioactivation and genotoxicity of the herbal constituents safrole, estragole and methyleugenol

    NARCIS (Netherlands)

    Jeurissen, S.M.F.

    2007-01-01

    The herbal constituents safrole, estragole, and methyleugenol, belonging to the chemical class of the alkenylbenzenes, are genotoxic and carcinogenic compounds. The genotoxicity of these alkenylbenzenes proceeds via electrophilic metabolites generated bycytochromeP450 enzymes (P450)

  10. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  11. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  12. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  13. Evaluation of Cytotoxicity and Genotoxicity of Acacia aroma Leaf Extracts

    Directory of Open Access Journals (Sweden)

    C. M. Mattana

    2014-01-01

    Full Text Available Acacia aroma, native plant from San Luis, Argentina, is commonly used as antiseptic and for healing of wounds. The present study was conducted to investigate the in vitro cytotoxicity and genotoxicity of hot aqueous extract (HAE and ethanolic extract (EE of A. aroma. The cytotoxic activity was assayed by neutral red uptake assay on Vero cell. Cell treatment with a range from 100 to 5000 μg/mL of HAE and EE showed that 500 μg/mL and 100 μg/mL were the maximum noncytotoxic concentrations, respectively. The CC50 was 658 μg/mL for EE and 1020 μg/mL for HAE. The genotoxicity was tested by the single-cell gel electrophoresis comet assay. The results obtained in the evaluation of DNA cellular damage exposed to varied concentrations of the HAE showed no significant genotoxic effect at range of 1–20 mg/mL. The EE at 20 mg/mL showed moderate genotoxic effect related to the increase of the DNA percentage contained in tail of the comet; DNA was classified in category 2. At concentrations below 5 mg/mL, the results of cytotoxicity and genotoxicity of aqueous and ethanolic extracts of Acacia aroma guarantee the safety at cell and genomic level. However further studies are needed for longer periods including animal models to confirm the findings.

  14. The role of human O(6)-alkylguanine-DNA alkyltransferase in promoting 1,2-dibromoethane-induced genotoxicity in Escherichia coli.

    Science.gov (United States)

    Liu, H; Xu-Welliver, M; Pegg, A E

    2000-07-20

    The expression of the DNA repair protein human O(6)-alkylguanine-DNA alkyltransferase (AGT) in Escherichia coli strains GWR109 or TRG8 that lack endogenous AGT greatly increased the toxicity and mutagenicity of 1,2-dibromoethane (DBE). Pretreatment of strain TRG8 expressing human AGT, which is permeable to exogenous drugs, with the AGT inhibitor O(6)-benzylguanine (BG) abolished the lethal and mutagenic effects of DBE, indicating that an active AGT is required for promoting DBE genotoxicity. This was confirmed by the observation that E. coli expressing either the C145A AGT mutant, which is inactive due to loss of the alkyl acceptor site, or mutants Y114E and R128A, which are inactive due to alteration of the DNA binding domain, did not enhance the action of DBE. However, the AGT mutant protein P138M/V139L/P140K, which is active in repairing methylated DNA but is totally resistant to inactivation by BG due to alterations in the active site pocket, was unable to enhance the genotoxicity of DBE. Similarly, other mutants, G156P, Y158H and K165R that are strongly resistant to BG, were much less effective than wild type AGT in mediating the genotoxicity of DBE. Mutant P140A, which is moderately resistant to BG, did increase mutations in response to DBE but was less active than wild type. These results suggest that human AGT is able to interact with a DNA lesion produced by DBE but, instead of repairing it, converts it to a more genotoxic adduct. This interaction is prevented by mutations that modify the active site of AGT to exclude BG.

  15. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available taxonomy and ontology RP van Heerden1,2, B Irwin2, ID Burke1, L Leenen1 1CSIR, Pretoria, South Africa 2Rhodes University, Grahamstown, South Africa Keywords/ Key Phrases: Network Attack, Network Attack Classification, Taxonomy, Ontology, Attack... Scenario rvheerden@csir.co.za b.irwin@ru.ac.za iburke@csir.co.za lleenen@csir.co.za Abstract: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has a...

  16. Catabolism of exogenously supplied thymidine to thymine and dihydrothymine by platelets in human peripheral blood

    International Nuclear Information System (INIS)

    Pero, R.W.; Johnson, D.; Olsson, A.

    1984-01-01

    The interference of platelets with the estimation of unscheduled DNA synthesis in human peripheral mononuclear leukocytes following genotoxic exposure was studied. A 96% reduction in the unscheduled DNA synthesis value was achieved by incubating [ 3 H]thymidine with platelet-rich plasma for 5 hr at 37 degrees. Using radioactive thymine-containing compounds, together with quantitative analyses based on thin-layer and ion-exchange chromatographies, we have shown that thymidine was converted to thymine which, in turn, was converted to dihydrothymine in platelet-rich plasma. The enzymes responsible were separated from platelet lysates by gel filtration and were identified as thymidine phosphorylase and dihydrothymine dehydrogenase. The phosphorylase reversibly catalyzed the formation of thymine from thymidine and converted bromodeoxyuridine to bromouracil. The dehydrogenase reversibly catalyzed the interconversion of thymine and dihydrothymine in a reaction dependent on NADP(H), and it was inhibited by diazouracil and by thymine. Nearly all the thymidine-catabolizing activity found in whole blood samples supplied exogenously with thymidine was accounted for by the platelets. Since most genetic toxicological tests that use blood samples do not involve removing platelets from the blood cell cultures, then it is concluded that precautions should be taken in the future to determine the influence of platelets on these test systems. This is particularly true for methods dependent on thymidine pulses such as unscheduled DNA synthesis, or those dependent on bromodeoxyuridine, such as sister chromatid exchanges, since this nucleoside is also a substrate for thymidine phosphorylase

  17. Genotoxicity of Superparamagnetic Iron Oxide Nanoparticles in Granulosa Cells

    Directory of Open Access Journals (Sweden)

    Marina Pöttler

    2015-11-01

    Full Text Available Nanoparticles that are aimed at targeting cancer cells, but sparing healthy tissue provide an attractive platform of implementation for hyperthermia or as carriers of chemotherapeutics. According to the literature, diverse effects of nanoparticles relating to mammalian reproductive tissue are described. To address the impact of nanoparticles on cyto- and genotoxicity concerning the reproductive system, we examined the effect of superparamagnetic iron oxide nanoparticles (SPIONs on granulosa cells, which are very important for ovarian function and female fertility. Human granulosa cells (HLG-5 were treated with SPIONs, either coated with lauric acid (SEONLA only, or additionally with a protein corona of bovine serum albumin (BSA; SEONLA-BSA, or with dextran (SEONDEX. Both micronuclei testing and the detection of γH2A.X revealed no genotoxic effects of SEONLA-BSA, SEONDEX or SEONLA. Thus, it was demonstrated that different coatings of SPIONs improve biocompatibility, especially in terms of genotoxicity towards cells of the reproductive system.

  18. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...

  19. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  20. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  1. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  2. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  3. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... vitamins help prevent a heart attack? Can taking vitamins help prevent heart disease or a heart attack? Answers ... M.D. It's not yet clear if taking vitamins can reduce your risk of developing heart disease ...

  4. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  5. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on

  6. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  7. Is the Comet Assay a Sensitive Procedure for Detecting Genotoxicity?

    Directory of Open Access Journals (Sweden)

    Satomi Kawaguchi

    2010-01-01

    Full Text Available Although the Comet assay, a procedure for quantitating DNA damage in mammalian cells, is considered sensitive, it has never been ascertained that its sensitivity is higher than the sensitivity of other genotoxicity assays in mammalian cells. To determine whether the power of the Comet assay to detect a low level of genotoxic potential is superior to those of other genotoxicity assays in mammalian cells, we compared the results of Comet assay with those of micronucleus test (MN test. WTK1 human lymphoblastoid cells were exposed to methyl nitrosourea (MNU, ethyl nitrosourea (ENU, methyl methanesulfonate (MMS, ethyl methanesulfonate (EMS, bleomycin (BLM, or UVC. In Comet assay, cells were exposed to each mutagen with (Comet assay/araC and without (Comet assay DNA repair inhibitors (araC and hydroxyurea. Furthermore, acellular Comet assay (acellular assay was performed to determine how single-strand breaks (SSBs as the initial damage contributes to DNA migration and/or to micronucleus formation. The lowest genotoxic dose (LGD, which is defined as the lowest dose at which each mutagen causes a positive response on each genotoxicity assay, was used to compare the power of the Comet assay to detect a low level of genotoxic potential and that of MN test; that is, a low LGD indicates a high power. Results are summarized as follows: (1 for all mutagens studied, LGDs were MN test ≦ Comet assay; (2 except for BLM, LGDs were Comet assay/araC ≦ MN test; (3 except for UVC and MNU, LGDs were acellular assay ≦ Comet assay/araC ≦ MN test ≦ Comet assay. The following is suggested by the present findings: (1 LGD in the Comet assay is higher than that in MN test, which suggests that the power of the MN test to detect a low level of genotoxic potential is superior to that of the Comet assay; (2 for the studied mutagens, all assays were able to detect all mutagens correctly, which suggests that the sensitivity of the Comet assay and that of the MN test were

  8. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  9. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  10. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  11. Correlation between the genotoxicity endpoints measured by two different genotoxicity assays: comet assay and CBMN assay

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-06-01

    The results concerning of positive findings by micronuclei and non significant ones by comet assay, are corroborated by Deng et al. (2005 study performed in workers occupationally exposed to methotrexate, also a cytostatic drug. According to Cavallo et al. (2009, the comet assay seems to be more suitable for the prompt evaluation of the genotoxic effects, for instance, of polycyclic aromatic hydrocarbons mixtures containing volatile substances, whereas the micronucleus test seems more appropriate to evaluate the effects of exposure to antineoplastic agents. However, there are studies that observed an increase in both the comet assay and the micronucleus test in nurses handling antineoplastic drugs, although statistical significance was only seen in the comet assay, quite the opposite of our results (Maluf & Erdtmann, 2000; Laffon et al. 2005.

  12. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  13. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  14. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  15. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  17. The effects of exogenous proline and osmotic stress on morpho ...

    African Journals Online (AJOL)

    For evaluation of growth parameters of strawberry callus under osmotic stress and exogenous proline, embryonic calli were transferred to Murashige and Skoog (MS) medium containing four sucrose (osmotic stress) treatments including 3, 6, 9 and 12% and various concentrations of exogenous Lproline (0, 2.5, 5 and 10 ...

  18. Effect Of Exogenous Progesterone On Blood Chemistry Of Large ...

    African Journals Online (AJOL)

    Exogenous hormones are major economic factors in swine production. This study evaluate the effects of exogenous administration of progesterone on the blood chemistry of pigs.Experiment involved weekly injections of progesterone to 24 pigs (12 males and 12 females)from day old to 24 weeks and only corn oil to another ...

  19. Explaining Cigarette Smoking: An Endogenous-Exogenous Analysis.

    Science.gov (United States)

    McKillip, Jack

    Kruglanski's endogenous-exogenous partition, when applied to reasons given by smokers for smoking cigarettes, distinguishes two types of actions: (1) endogenous reasons implying that the behavior of consuming the cigarette is the goal of the action and the actor is positive toward the behavior, and (2) exogenous reasons implying that the behavior…

  20. The Endogenous-Exogenous Partition in Attribution Theory

    Science.gov (United States)

    Kruglanski, Arie W.

    1975-01-01

    Within lay explanation of actions, several significant inferences are assumed to follow from the partition between endogenous and exogenous attributions. An endogenous action is judged to constitute an end in itself; an exogenous action is judged to serve as a means to some further end. (Editor/RK)

  1. Inheritance and segregation of exogenous genes in transgenic cotton

    Indian Academy of Sciences (India)

    The results confirm inheritance and segregation of. the exogenous Bt gene in transgenic CCRI 30 and NewCott 33B, governing resistance to bollworm, and; the exogenous tfdA gene in transgenic TFD, governing resistance to the herbicide 2,4-D. Both resistance characters were governed by a single dominant nuclear gene ...

  2. The effects of exogenous proline and osmotic stress on morpho ...

    African Journals Online (AJOL)

    USER

    2010-06-21

    Jun 21, 2010 ... For evaluation of growth parameters of strawberry callus under osmotic stress and exogenous proline, embryonic calli were transferred to Murashige and Skoog (MS) medium containing four sucrose. (osmotic stress) treatments including 3, 6, 9 and 12% and various concentrations of exogenous L- proline ...

  3. SIGNALING TO THE P53 TUMOR SUPPRESSOR THROUGH PATHWAYS ACTIVATED BY GENOTOXIC AND NON-GENOTOXIC STRESSES.

    Energy Technology Data Exchange (ETDEWEB)

    ANDERSON,C.W.APPELLA,E.

    2002-07-01

    The p53 tumor suppressor is a tetrameric transcription factor that is post-translational modified at {approx}18 different sites by phosphorylation, acetylation, or sumoylation in response to various cellular stress conditions. Specific posttranslational modifications, or groups of modifications, that result from the activation of different stress-induced signaling pathways are thought to modulate p53 activity to regulate cell fate by inducing cell cycle arrest, apoptosis, or cellular senescence. Here we review the posttranslational modifications to p53 and the pathways that produce them in response to both genotoxic and non-genotoxic stresses.

  4. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  5. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  6. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  7. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  8. [Exogenous surfactant therapy: new synthetic surfactants].

    Science.gov (United States)

    Lacaze-Masmonteil, Th

    2008-06-01

    There are numerous pulmonary conditions in which qualitative or quantitative anomalies of the surfactant system have been demonstrated. In premature newborns with immature lungs, a functional deficit in surfactant is the main physiopathologic mechanism of the neonatal respiratory distress syndrome (RDS). Since the landmark pilot study of Fujiwara, published more than 20 years ago, the efficacy of exogenous surfactant for the treatment of neonatal RDS has been established by numerous controlled studies and meta-analyses. Enlightened by a growing insight into both the structure and function of the different surfactant components, a new generation of synthetic surfactants has been developed. Various complementary approaches have confirmed the fundamental role of the two hydrophobic proteins, SP-B and SP-C, in the surfactant system, thus opening the way to the design of analogues, either by chemical synthesis or expression in a prokaryotic system. An example of these peptide-containing synthetic surfactant preparations, lucinactant (Surfaxin), has been recently tested in comparison to a synthetic surfactant that does not contain protein as well as to animal derived surfactant preparations. Major clinical outcomes between lucinactant and animal-derived surfactant preparations were fund similar in two randomized controlled trials, opening the way to a new generation of synthetic surfactants in the near future.

  9. Evolutionarily Distant Streptophyta Respond Differently to Genotoxic Stress

    Directory of Open Access Journals (Sweden)

    Radka Vágnerová

    2017-11-01

    Full Text Available Research in algae usually focuses on the description and characterization of morpho—and phenotype as a result of adaptation to a particular habitat and its conditions. To better understand the evolution of lineages we characterized responses of filamentous streptophyte green algae of the genera Klebsormidium and Zygnema, and of a land plant—the moss Physcomitrella patens—to genotoxic stress that might be relevant to their environment. We studied the induction and repair of DNA double strand breaks (DSBs elicited by the radiomimetic drug bleomycin, DNA single strand breaks (SSB as consequence of base modification by the alkylation agent methyl methanesulfonate (MMS and of ultra violet (UV-induced photo-dimers, because the mode of action of these three genotoxic agents is well understood. We show that the Klebsormidium and Physcomitrella are similarly sensitive to introduced DNA lesions and have similar rates of DSBs repair. In contrast, less DNA damage and higher repair rate of DSBs was detected in Zygnema, suggesting different mechanisms of maintaining genome integrity in response to genotoxic stress. Nevertheless, contrary to fewer detected lesions is Zygnema more sensitive to genotoxic treatment than Klebsormidium and Physcomitrella

  10. Genotoxicity of Agricultural Soils after one year of Conversion Period ...

    African Journals Online (AJOL)

    genotoxicity in a field after one year of conversion and in a field under conventional agriculture, not located close to sources of pollution. Soil samples were taken from 0-20 cm and 20-40 cm depth. Allium cepa-test system was used for the cytogenetic analysis. The higher mitotic index and lower frequency of chromosome ...

  11. Mutagenicity and genotoxicity of coal fly ash water leachate.

    Science.gov (United States)

    Chakraborty, Rajarshi; Mukherjee, Anita

    2009-03-01

    Fly ash is a by-product of coal-fired electricity generation plants. The prevalent practice of disposal is as slurry of ash and water to storage or ash ponds located near power stations. This has lain to waste thousands of hectares of land all over the world. Since leaching is often the cause of off-site contamination and pathway of introduction into the human environment, a study on the genotoxic effects of fly ash leachate is essential. Leachate prepared from the fly ash sample was analyzed for metal content, and tested for mutagenicity and genotoxicity. Analyses of metals show predominance of the metals-sodium, silicon, potassium, calcium, magnesium, iron, manganese, zinc, and sulphate. The Ames Salmonella mutagenicity assay, a short-term bacterial reverse mutation assay, was conducted on two-tester strains of Salmonella typhimurium strains TA97a and TA102. For genotoxicity, the alkaline version of comet assay on fly ash leachate was carried in vitro on human blood cells and in vivo on Nicotiana plants. The leachate was directly mutagenic and induced significant (Ppercentage (%), tail length (mum), and olive tail moment (arbitrary units). Our results indicate that leachate from fly ash dumpsites has the genotoxic potential and may lead to adverse effects on vegetation and on the health of exposed human populations.

  12. Genotoxicity evaluation of the insecticide ethion in root of Allium ...

    African Journals Online (AJOL)

    USER

    2010-07-05

    Jul 5, 2010 ... 3Department of Bio-Health Technology, Kangwon National University, Chuncheon, 200-701, Korea. 4Department of Applied Life Science, Konkuk University, Seoul, 143-701, Korea. Accepted 8 June, 2010. In this study, the genotoxic effects of ethion were investigated in the mitotic cell division of Allium.

  13. In vitro genotoxicity of piperacillin impurity-A

    African Journals Online (AJOL)

    SERVER

    2007-09-19

    Sep 19, 2007 ... The manufacturing and storage of the piperacillin produce different impurities of various concentrations, which may influence the efficacy and safety of the drug. Since no report of genotoxicity data is available on the impurities of piperacillin, further studies were designed and conducted to.

  14. Genotoxicity studies of dry extract of Boswellia serrata | Magesh ...

    African Journals Online (AJOL)

    Genotoxicity studies of dry extract of Boswellia serrata. V Magesh, D Raman, KT Pudupalayam. Abstract. Purpose: Boswellia serrata, a common medicinal plant, has multiple uses in traditional medicine and, in particular, for the treatment of inflammatory diseases. The plant and its extracts have been evaluated for a number ...

  15. Studies on the Genotoxic and Mutagenic Potentials of Mefloquine ...

    African Journals Online (AJOL)

    Purpose: The detection of mefloquine mutagenicity has not been achieved by the use of Salmonella typhimurium his TA1535, TA1537 as tester strains. With the introduction of improved and more sensitive strains, it is of interest to evaluate the current mutagenic and genotoxic status of the drug. This study presents data on ...

  16. In vitro genotoxicity of piperacillin impurity-A | Vijayan | African ...

    African Journals Online (AJOL)

    Since no report of genotoxicity data is available on the impurities of piperacillin, further studies were designed and conducted to provide information for establishing the safety profile and qualification of the piperacillin impurity-A. Salmonella typhimurium strains were exposed to Piperacillin impurity-A for Ames tests. Neither ...

  17. Genotoxic Maillard byproducts in current phytopharmaceutical preparations of Echinodorus grandiflorus

    Directory of Open Access Journals (Sweden)

    ELISANGELA C. LIMA-DELLAMORA

    2014-09-01

    Full Text Available Extracts of Echinodorus grandiflorus obtained from dried leaves by three different techniques were evaluated by bacterial lysogenic induction assay (Inductest in relation to their genotoxic properties. Before being added to test cultures, extracts were sterilized either by steam sterilization or ultraviolet light. Only the extracts prepared by infusion and steam sterilized have shown genotoxic activity. The phytochemical analysis revealed the presence of the flavonoids isovitexin, isoorientin, swertisin and swertiajaponin, isolated from a genotoxic fraction. They were assayed separately and tested negative in the Inductest protocol. The development of browning color and sweet smell in extracts submitted to heat, prompted further chemical analysis in search for Maillard's reaction precursors. Several aminoacids and reducing sugars were cast in the extract. The presence of characteristic Maillard's melanoidins products was determined by spectrophotometry in the visible region and the inhibition of this reaction was observed when its characteristic inhibitor, sodium bisulfite, was added prior to heating. Remarkably, this is the first paper reporting on the appearance of such compounds in a phytomedicine preparation under a current phytopharmaceutical procedure. The genotoxic activity of such heat-prepared infusions imply in some risk of developing degenerative diseases for patients in long-term, uncontrolled use of such phytomedicines.

  18. Anti-Genotoxic Potential of Bilirubin In Vivo

    DEFF Research Database (Denmark)

    Wallner, Marlies; Antl, Nadja; Rittmannsberger, Barbara

    2013-01-01

    The bile pigment bilirubin is a known antioxidant and is associated with protection from cancer and cardiovascular disease (CVD) when present in too strong concentrations. Unconjugated bilirubin (UCB) might also possess anti-genotoxic potential by preventing oxidative damage to DNA. Moderately el...

  19. Determination of heavy metals and genotoxicity of water from an ...

    African Journals Online (AJOL)

    The mineral processing and geochemical processes may determine high concentrations of heavy metals in water intended for human consumption. Thus, the present study aimed to quantify and evaluate the heavy metal genotoxicity of artesian water in the city by Atomic absorption spectrophotometer analysis and testing ...

  20. Studies on the Genotoxic and Mutagenic Potentials of Mefloquine

    African Journals Online (AJOL)

    Purpose: The detection of mefloquine mutagenicity has not been achieved by the use of. Salmonella typhimurium his TA1535, TA1537 as tester strains. With the introduction of improved and more sensitive strains, it is of interest to evaluate the current mutagenic and genotoxic status of the drug. This study presents data on ...

  1. Evaluation of bilge water-induced plant genotoxicity using randomly ...

    African Journals Online (AJOL)

    Evaluation of bilge water-induced plant genotoxicity using randomly amplified polymorphic dna (rapd) ... Ife Journal of Science ... The Random Amplified Polymorphic DNA (RAPD) technique was employed to evaluate the level of DNA alteration in Allium cepa root tips exposed to different concentrations of bilge water (1, 5, ...

  2. Genistein genotoxicity: Critical considerations of in vitro exposure dose

    International Nuclear Information System (INIS)

    Klein, Catherine B.; King, Audrey A.

    2007-01-01

    The potential health benefits of soy-derived phytoestrogens include their reported utility as anticarcinogens, cardioprotectants and as hormone replacement alternatives in menopause. Although there is increasing popularity of dietary phytoestrogen supplementation and of vegetarian and vegan diets among adolescents and adults, concerns about potential detrimental or other genotoxic effects persist. While a variety of genotoxic effects of phytoestrogens have been reported in vitro, the concentrations at which such effects occurred were often much higher than the physiologically relevant doses achievable by dietary or pharmacologic intake of soy foods or supplements. This review focuses on in vitro studies of the most abundant soy phytoestrogen, genistein, critically examining dose as a crucial determinant of cellular effects. In consideration of levels of dietary genistein uptake and bioavailability we have defined in vitro concentrations of genistein > 5 μM as non-physiological, and thus 'high' doses, in contrast to much of the previous literature. In doing so, many of the often-cited genotoxic effects of genistein, including apoptosis, cell growth inhibition, topoisomerase inhibition and others become less obvious. Recent cellular, epigenetic and microarray studies are beginning to decipher genistein effects that occur at dietarily relevant low concentrations. In toxicology, the well accepted principle of 'the dose defines the poison' applies to many toxicants and can be invoked, as herein, to distinguish genotoxic versus potentially beneficial in vitro effects of natural dietary products such as genistein

  3. Genotoxic Effect of Atrazine, Arsenic, Cadmium and Nitrate ...

    African Journals Online (AJOL)

    aromatase enzyme. Arsenic and Cadmium have been implicated in the etiology of skin, lung, prostate and liver cancers. Nitrate in drinking water has been found to increase the risk of bladder cancer. This study examined the genotoxicity of the aforementioned HAAs alone and in mixtures using mammalian breast cell lines, ...

  4. Linking genotoxic responses and reproductive success in ecotoxicology

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, S.L.; Wild, G.C. [Lawrence Berkeley Lab., CA (United States)

    1994-12-01

    The potential of genotoxicity biomarkers as predictors of detrimental environmental effects, such as altered reproductive success of wild organisms, must be rigorously determined. Recent research to evaluate relationships between genotoxic responses and indicators of reproductive success in model animals is described from an ecotoxicological perspective. Genotoxicity can be correlated with reproductive effects such as gamete loss due to cell death; embryonic mortality; and heritable mutations in a range of model animals including polychaete worms, nematodes, sea urchins, amphibians, and fish. In preliminary studies, the polychaete worm, Neanthes arenaceodentata, and the nematode, Caenorhabditis elegans, have also shown the potential for cumulative DNA damage in gametes. If DNA repair capacity is limited in gametes, then selected life history traits such as long and synchronous periods of gametogenesis may confer vulnerability to genotoxic substances in chronic exposures. Recommendations for future research include strategic development of animal models that can be used to elucidate multiple mechanisms of effect (multiend point) at varying levels of biological organization (multilevel). 27 refs., 2 tabs.

  5. Comparative studies of genotoxicity and anti-plasmodial activities of ...

    African Journals Online (AJOL)

    Drug resistance in malaria infection is a serious public health challenge. Thus, scientific search for alternative treatment measures among the local medicinal plants is exigent. We therefore investigated the anti-plasmodial efficacy and genotoxicity of the methanolic leaf and stem extracts of Alstonia plant at varying ...

  6. In vitro evaluation of mutagenicity and genotoxicity of sitagliptin ...

    African Journals Online (AJOL)

    ... Hajvery University Lahore, 3Quality Operation. Laboratory (QOL), University of Veterinary and Animal Sciences, 4Depertment of Biotechnology, Lahore College for Women ... Revised accepted: 11 July 2017. Abstract. Purpose: To determine the in vitro genotoxicity and mutagenicity of sitagliptin alone and in combination.

  7. Does Caesalpinia bonducella ameliorate genotoxicity? An in vitro ...

    African Journals Online (AJOL)

    The aim of the study is to investigate the antimutagenic and antigenotoxic potential of alcoholic extracts of C. bonducella against methyl methane sulfonate (MMS) induced genotoxicity. In this experiment we have used in vitro method i.e., human lymphocyte culture and in vivo method in bone marrow cells of albino mice, ...

  8. Mercury-induced genotoxicity in marine diatom (Chaetoceros tenuissimus)

    Digital Repository Service at National Institute of Oceanography (India)

    Sarker, S.; Desai, S.R.; Verlecar, X.N.; Sarker, M.S.; Sarkar, A.

    In this paper, we present an evaluation of genotoxic responses in marine diatom, Chaetoceros tenuissimus, isolated from Kandla Creek (lat 23.03° N, long 70.22° E), Gujarat, India, in terms of impairment of DNA integrity as a function...

  9. Formation and removal of genotoxic activity during UV/H

    NARCIS (Netherlands)

    Heringa, M.B.; Harmsen, D.J.H.; Beerendonk, E.F.; Reus, A.A.; Krul, C.A.M.; Metz, D.H.; Ijpelaar, G.F.

    2011-01-01

    The objective of this study was to determine the genotoxic activity of water after UV/H2O2 oxidation and GAC filtration. Pre-treated surface water from three locations was treated with UV/H2O2 with medium pressure (MP) lamps and passed through granulated

  10. Evaluation of Genotoxic Pressure along the Sava River.

    Directory of Open Access Journals (Sweden)

    Stoimir Kolarević

    Full Text Available In this study we have performed a comprehensive genotoxicological survey along the 900 rkm of the Sava River. In total, 12 sites were chosen in compliance with the goals of GLOBAQUA project dealing with the effects of multiple stressors on biodiversity and functioning of aquatic ecosystems. The genotoxic potential was assessed using a complex battery of bioassays performed in prokaryotes and aquatic eukaryotes (freshwater fish. Battery comprised evaluation of mutagenicity by SOS/umuC test in Salmonella typhimurium TA1535/pSK1002. The level of DNA damage as a biomarker of exposure (comet assay and biomarker of effect (micronucleus assay and the level of oxidative stress as well (Fpg-modified comet assay was studied in blood cells of bleak and spirlin (Alburnus alburnus/Alburnoides bipunctatus respectively. Result indicated differential sensitivity of applied bioassays in detection of genotoxic pressure. The standard and Fpg-modified comet assay showed higher potential in differentiation of the sites based on genotoxic potential in comparison with micronucleus assay and SOS/umuC test. Our data represent snapshot of the current status of the river which indicates the presence of genotoxic potential along the river which can be traced to the deterioration of quality of the Sava River by communal and industrial wastewaters. The major highlight of the study is that we have provided complex set of data obtained from a single source (homogeneity of analyses for all samples.

  11. Genotoxicity evaluation of the insecticide ethion in root of Allium ...

    African Journals Online (AJOL)

    In this study, the genotoxic effects of ethion were investigated in the mitotic cell division of Allium cepa. Primary roots of A. cepa were treated with various concentrations (25, 50, 75, and 100%) of ethion solutions for different duration of time. The result revealed that increase in the concentration and duration of treatment ...

  12. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  13. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  14. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  15. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  16. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  17. Genotoxicity in native fish associated with agricultural runoff events

    Science.gov (United States)

    Whitehead, A.; Kuivila, K.M.; Orlando, J.L.; Kotelevtsev, S.; Anderson, S.L.

    2004-01-01

    The primary objective of the present study was to test whether agricultural chemical runoff was associated with in-stream genotoxicity in native fish. Using Sacramento sucker (Catostomus occidentalis), we combined field-caging experiments in an agriculturally dominated watershed with controlled laboratory exposures to field-collected water samples, and we coupled genotoxicity biomarker measurements in fish with bacterial mutagenicity analysis of water samples. We selected DNA strand breakage as a genotoxicity biomarker and Ames Salmonella mutagenicity tests as a second, supporting indicator of genotoxicity. Data from experiments conducted during rainfall runoff events following winter application of pesticides in 2000 and 2001 indicated that DNA strand breaks were significantly elevated in fish exposed to San Joaquin River (CA, USA) water (38.8, 28.4, and 53.6% DNA strand breakage in year 2000 field, year 2000 lab, and year 2001 field exposures, respectively) compared with a nearby reference site (15.4, 8.7, and 12.6% DNA strand breakage in year 2000 field, year 2000 lab, and year 2001 field exposures, respectively). Time-course measurements in field experiments supported a linkage between induction of DNA strand breakage and the timing of agricultural runoff. San Joaquin River water also caused significant reversion mutation in two Ames Salmonella tester strains. Salmonella mutagenicity corroborated in-stream effects, further strengthening a causal relationship between runoff events and genotoxicity. Potentially responsible agents are discussed in the context of timing of runoff events in the field, concordance between laboratory and field exposures, pesticide application patterns in the drainage, and analytical chemistry data.

  18. Health care industries: potential generators of genotoxic waste.

    Science.gov (United States)

    Sharma, Pratibha; Kumar, Manish; Mathur, N; Singh, A; Bhatnagar, P; Sogani, M

    2013-08-01

    Health care waste includes all the waste generated by health care establishments, research facilities, and laboratories. This constitutes a variety of chemical substances, such as pharmaceuticals, radionuclides, solvents, and disinfectants. Recently, scientists and environmentalists have discovered that wastewater produced by hospitals possesses toxic properties due to various toxic chemicals and pharmaceuticals capable of causing environmental impacts and even lethal effects to organisms in aquatic ecosystems. Many of these compounds resist normal wastewater treatment and end up in surface waters. Besides aquatic organisms, humans can be exposed through drinking water produced from contaminated surface water. Indeed, some of the substances found in wastewaters are genotoxic and are suspected to be potential contributors to certain cancers. The aim of this study was to evaluate the genotoxic and cytotoxic potential of wastewaters from two hospitals and three clinical diagnostic centers located in Jaipur (Rajasthan State), India using the prokaryotic Salmonella mutagenicity assay (Ames assay) and the eukaryotic Saccharomyces cerevisiae respiration inhibition assay. In the Ames assay, untreated wastewaters from both of the health care sectors resulted in significantly increased numbers of revertant colonies up to 1,000-4,050 as measured by the Salmonella typhimurium TA98 and TA100 strains (with and without metabolic activation) after exposure to undiluted samples, which indicated the highly genotoxic nature of these wastewaters. Furthermore, both hospital and diagnostic samples were found to be highly cytotoxic. Effective concentrations at which 20 % (EC20) and 50 % (EC50) inhibition of the respiration rate of the cells occurred ranged between ~0.00 and 0.52 % and between 0.005 and 41.30 % (calculated with the help of the MS excel software XLSTAT 2012.1.01; Addinsoft), respectively, as determined by the S. cerevisiae assay. The results indicated that hospital

  19. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Mar 15,2018 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  20. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    . However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute......Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  1. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  2. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  3. Genotoxicity of 2-bromo-3′-chloropropiophenone

    International Nuclear Information System (INIS)

    Meng, Fanxue; Yan, Jian; Li, Yan; Fu, Peter P.; Fossom, Linda H.; Sood, Ramesh K.; Mans, Daniel J.; Chu, Pei-I; Moore, Martha M.; Chen, Tao

    2013-01-01

    Impurities are present in any drug substance or drug product. They can be process-related impurities that are not completely removed during purification or are formed due to the degradation of the drug substance over the product shelf-life. Unlike the drug substance, impurities generally do not have beneficial effects and may present a risk without associated benefit. Therefore, their amount should be minimized. 2-Bromo-3′-chloropropiophenone (BCP) is an impurity of bupropion, a second-generation antidepressant and a smoking cessation aid. The United States Pharmacopeia recommends an acceptable level for BCP that is not more than 0.1% of the bupropion. Because exposure to genotoxic impurities even at low levels is of significant concern, it is important to determine whether or not BCP is genotoxic. Therefore, in this study the Ames test and the in vitro micronucleus assay were conducted to evaluate the genotoxicity of BCP. BCP was mutagenic with S9 metabolic activation, increasing the mutant frequencies in a concentration-dependent manner, up to 22- and 145-fold induction over the controls in Salmonella strains TA100 and TA1535, respectively. BCP was also positive in the in vitro micronucleus assay, resulting in up to 3.3- and 5.1-fold increase of micronucleus frequency for treatments in the absence and presence of S9, respectively; and 9.9- and 7.4-fold increase of aneuploidies without and with S9, respectively. The addition of N-acetyl-L-cysteine, an antioxidant, reduced the genotoxicity of BCP in both assays. Further studies showed that BCP treatment resulted in induction of reactive oxygen species (ROS) in the TK6 cells. The results suggest that BCP is mutagenic, clastogenic, and aneugenic, and that these activities are mediated via generation of reactive metabolites. - Highlights: • 2-Bromo-3′-chloropropiophenone is an impurity of bupropion. • BCP was positive in both the Ames test and the in vitro micronucleus assay. • It induced high frequencies of

  4. Genotoxicity of diuron and glyphosate in oyster spermatozoa and embryos.

    Science.gov (United States)

    Akcha, F; Spagnol, C; Rouxel, J

    2012-01-15

    We investigated the effects of genotoxicant exposure in gametes and embryos to find a possible link between genotoxicity and reproduction/developmental impairment, and explore the impact of chemical genotoxicity on population dynamics. Our study focused on the genotoxic effects of two herbicides on oyster gametes and embryos: glyphosate (both as an active substance and in the Roundup formulation) and diuron. France is Europe's leading consumer of agrochemical substances and as such, contamination of France's coastal waters by pesticides is a major concern. Glyphosate and diuron are among the most frequently detected herbicides in oyster production areas; as oyster is a specie with external reproduction, its gametes and embryos are in direct contact with the surrounding waters and are hence particularly exposed to these potentially dangerous substances. In the course of this study, differences in genotoxic and embryotoxic responses were observed in the various experiments, possibly due to differences in pollutant sensitivity between the tested genitor lots. Glyphosate and Roundup had no effect on oyster development at the concentrations tested, whereas diuron significantly affected embryo-larval development from the lowest tested concentration of 0.05 μg L⁻¹, i.e. an environmentally realistic concentration. Diuron may therefore have a significant impact on oyster recruitment rates in the natural environment. Our spermiotoxicity study revealed none of the tested herbicides to be cytotoxic for oyster spermatozoa. However, the alkaline comet assay showed diuron to have a significant genotoxic effect on oyster spermatozoa at concentrations of 0.05 μg L⁻¹ upwards. Conversely, no effects due to diuron exposure were observed on sperm mitochondrial function or acrosomal membrane integrity. Although our initial results showed no negative effect on sperm function, the possible impact on fertilization rate and the consequences of the transmission of damaged DNA for

  5. Genotoxicity of 2-bromo-3′-chloropropiophenone

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Fanxue; Yan, Jian; Li, Yan [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Fu, Peter P. [Division of Biochemical Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Fossom, Linda H.; Sood, Ramesh K.; Mans, Daniel J.; Chu, Pei-I [Center for Drug Evaluation and Research, Food and Drug Administration, 10903 New Hampshire Avenue, Silver Spring, MD 20993 (United States); Moore, Martha M. [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States); Chen, Tao, E-mail: tao.chen@fda.hhs.gov [Division of Genetic and Molecular Toxicology, National Center for Toxicological Research, Food and Drug Administration, 3900 NCTR Road, Jefferson, AR 72079 (United States)

    2013-07-15

    Impurities are present in any drug substance or drug product. They can be process-related impurities that are not completely removed during purification or are formed due to the degradation of the drug substance over the product shelf-life. Unlike the drug substance, impurities generally do not have beneficial effects and may present a risk without associated benefit. Therefore, their amount should be minimized. 2-Bromo-3′-chloropropiophenone (BCP) is an impurity of bupropion, a second-generation antidepressant and a smoking cessation aid. The United States Pharmacopeia recommends an acceptable level for BCP that is not more than 0.1% of the bupropion. Because exposure to genotoxic impurities even at low levels is of significant concern, it is important to determine whether or not BCP is genotoxic. Therefore, in this study the Ames test and the in vitro micronucleus assay were conducted to evaluate the genotoxicity of BCP. BCP was mutagenic with S9 metabolic activation, increasing the mutant frequencies in a concentration-dependent manner, up to 22- and 145-fold induction over the controls in Salmonella strains TA100 and TA1535, respectively. BCP was also positive in the in vitro micronucleus assay, resulting in up to 3.3- and 5.1-fold increase of micronucleus frequency for treatments in the absence and presence of S9, respectively; and 9.9- and 7.4-fold increase of aneuploidies without and with S9, respectively. The addition of N-acetyl-L-cysteine, an antioxidant, reduced the genotoxicity of BCP in both assays. Further studies showed that BCP treatment resulted in induction of reactive oxygen species (ROS) in the TK6 cells. The results suggest that BCP is mutagenic, clastogenic, and aneugenic, and that these activities are mediated via generation of reactive metabolites. - Highlights: • 2-Bromo-3′-chloropropiophenone is an impurity of bupropion. • BCP was positive in both the Ames test and the in vitro micronucleus assay. • It induced high frequencies of

  6. Effect of exogenously added rhamnolipids on citric acid production ...

    African Journals Online (AJOL)

    Effect of exogenously added rhamnolipids on citric acid production yield. Wojciech Białas, Roman Marecik, Alicja Szulc, Łukasz Ławniczak, Łukasz Chrzanowski, Filip Ciesielczyk, Teofil Jesionowski, Andreas Aurich ...

  7. Effects of exogenous polyamines and inhibitors of polyamine ...

    African Journals Online (AJOL)

    guanylhydrazone) (MGBG) and dicyclohexylamine (DCHA) or three exogenous polyamines (putrescine, spermidine and spermine) were added into a modified HLM-1 maturation medium inoculated with embryogenic tissues. Medium responses were ...

  8. Mixed Causal-Noncausal Autoregressions with Strictly Exogenous Regressors

    NARCIS (Netherlands)

    Hecq, Alain; Issler, J.V.; Telg, Sean

    2017-01-01

    The mixed autoregressive causal-noncausal model (MAR) has been proposed to estimate economic relationships involving explosive roots in their autoregressive part, as they have stationary forward solutions. In previous work, possible exogenous variables in economic relationships are substituted into

  9. Minnesota urban partnership agreement national evaluation : exogenous factors test plan.

    Science.gov (United States)

    2009-11-17

    This report presents the exogenous factors test plan for the national evaluation of the Minnesota Urban Partnership Agreement (UPA) under the United States Department of Transportation (U.S. DOT) UPA Program. The Minnesota UPA projects focus on reduc...

  10. Isolating Exogenous and Endogenous Modes of Temporal Attention

    Science.gov (United States)

    Lawrence, Michael A.; Klein, Raymond M.

    2013-01-01

    The differential allocation of information processing resources over time, here termed "temporal attention," may be achieved by relatively automatic "exogenous" or controlled "endogenous" mechanisms. Over 100 years of research has confounded these theoretically distinct dimensions of temporal attention. The current…

  11. The use of exogenous microbial species to enhance the ...

    African Journals Online (AJOL)

    film bioreactor with exogenous bacterial and diatoma species would increase the removal of chemical oxygen demand, nitrogenous compounds and suspended solids from a real-time coal gasification wastewater to meet environmental ...

  12. Brain imaging with 123I-IMP-SPECT in migraine between attacks

    International Nuclear Information System (INIS)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.; Husstedt, I.W.

    1989-01-01

    123 I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migraine attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors

  13. Endogenous versus Exogenous Growth Factor Regulation of Articular Chondrocytes

    OpenAIRE

    Shi, Shuiliang; Chan, Albert G.; Mercer, Scott; Eckert, George J.; Trippel, Stephen B.

    2013-01-01

    Anabolic growth factors that regulate the function of articular chondrocytes are candidates for articular cartilage repair. Such factors may be delivered by pharmacotherapy in the form of exogenous proteins, or by gene therapy as endogenous proteins. It is unknown whether delivery method influences growth factor effectiveness in regulating articular chondrocyte reparative functions. We treated adult bovine articular chondrocytes with exogenous recombinant insulin-like growth factor-I (IGF-I) ...

  14. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  15. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  16. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    Directory of Open Access Journals (Sweden)

    Frédéric Moisan

    2017-06-01

    Full Text Available Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies.

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... engineered as part of this work. This is the first time CSSAs for the Skylake architecture are reported. Our attacks demonstrate that cryptographic applications in cloud computing environments using key-dependent tables for acceleration are still vulnerable even on recent architectures, including Skylake...

  18. Religion and support for suicide attacks.

    Science.gov (United States)

    Ginges, Jeremy; Hansen, Ian; Norenzayan, Ara

    2009-02-01

    In four studies carried out across different cultural, religious, and political contexts, we investigated the association between religion and popular support for suicide attacks. In two surveys of Palestinians and one cognitive priming experiment with Israeli settlers, prayer to God, an index of religious devotion, was unrelated to support for suicide attacks. Instead, attendance at religious services, thought to enhance coalitional commitment, positively predicted support for suicide attacks. In a survey of six religions in six nations, regular attendance at religious services positively predicted a combination of willing martyrdom and out-group hostility, but regular prayer did not. Implications for understanding the role of religion in suicide attacks are discussed.

  19. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  20. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  1. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout...

  2. Genotoxic and mutagenic effects of sewage sludge on higher plants.

    Science.gov (United States)

    Corrêa Martins, Maria Nilza; de Souza, Victor Ventura; Souza, Tatiana da Silva

    2016-02-01

    Sewage treatment yields sludge, which is often used as a soil amendment in agriculture and crop production. Although the sludge contains elevated concentrations of macro and micronutrients, high levels of inorganic and organic compounds with genotoxic and mutagenic properties are present in sludge. Application of sludge in agriculture is a pathway for direct contact of crops to toxic chemicals. The objective of this study was to compile information related to the genotoxic and mutagenic effects of sewage sludge in different plant species. In addition, data are presented on toxicological effects in animals fed with plants grown in soils supplemented with sewage sludge. Despite the benefits of using sewage sludge as organic fertilizer, the data showcased in this review suggest that this residue can induce genetic damage in plants. This review alerts potential risks to health outcomes after the intake of food cultivated in sewage sludge-amended soils. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Genotoxicity of unmodified and organo-modified montmorillonite

    DEFF Research Database (Denmark)

    Sharma, Anoop Kumar; Schmidt, Bjørn; Frandsen, Henrik Lauritz

    2010-01-01

    assay, none of the clays produced ROS in a cell-free test system (the DCFH-DA assay). Inductively coupled plasma mass-spectrometry (ICP-MS) was used to detect clay particles in the filtered samples using aluminium as a tracer element characteristic to clay. The results indicated that clay particles were...... absent in the filtered samples, which was independently confirmed by dynamic light-scattering measurements. Detection and identification of free quaternary ammonium modifier in the filtered sample was carried out by HPLC-Q-TOF/MS and revealed a total concentration of a mixture of quaternary ammonium...... analogues of 1.57 mu g/ml. These findings suggest that the genotoxicity of organo-modified montmorillonite was caused by the organo-modifier. The detected organo-modifier mixture was synthesized and comet-assay results showed that the genotoxic potency of this synthesized organo-modifier was in the same...

  4. Genotoxicity of indium tin oxide by comet test

    Directory of Open Access Journals (Sweden)

    İbrahim Hakkı Ciğerci

    2015-06-01

    Full Text Available Indium tin oxide (ITO is used for liquid crystal display (LCDs, electrochromic displays, flat panel displays, field emission displays, touch or laptop computer screens, cell phones, energy conserving architectural windows, defogging aircraft and automobile windows, heat-reflecting coatings to increase light bulb efficiency, gas sensors, antistatic window coatings, wear resistant layers on glass, nanowires and nanorods because of its unique properties of high electrical conductivity, transparency and mechanical resistance.Genotoxic effects of ITO were investigated on the root cells of Allium cepa by Comet assay. A. cepa roots were treated with the aqueous dispersions of ITO at 5 different concentrations (12.5, 25, 50, 75, and 100 ppm for 4 h. A significant increase in DNA damage was a observed at all concentrations of ITO by Comet assay. These result indicate that ITO exhibit genotoxic activity in A. cepa root meristematic cells.

  5. Genotoxicity of Euphorbia hirta: an Allium cepa assay.

    Science.gov (United States)

    Yuet Ping, Kwan; Darah, Ibrahim; Yusuf, Umi Kalsom; Yeng, Chen; Sasidharan, Sreenivasan

    2012-06-26

    The potential genotoxic effects of methanolic extracts of Euphorbia hirta which is commonly used in traditional medicine to treat a variety of diseased conditions including asthma, coughs, diarrhea and dysentery was investigated using Allium cepa assay. The extracts of 125, 250, 500 and 1,000 µg/mL were tested on root meristems of A. cepa. Ethylmethanesulfonate was used as positive control and distilled water was used as negative control. The result showed that mitotic index decreased as the concentrations of E. hirta extract increased. A dose-dependent increase of chromosome aberrations was also observed. Abnormalities scored were stickiness, c-mitosis, bridges and vagrant chromosomes. Micronucleated cells were also observed at interphase. Result of this study confirmed that the methanol extracts of E. hirta exerted significant genotoxic and mitodepressive effects at 1,000 µg/mL.

  6. Genotoxic effect of formocresol pulp therapy of deciduous teeth.

    Science.gov (United States)

    Lucas Leite, Ana Catarina Gaioso; Rosenblatt, Aronita; da Silva Calixto, Merilane; da Silva, Cirlene Maria; Santos, Neide

    2012-08-30

    To investigate whether formocresol, in Buckley's original formulation, used for pulp therapy of deciduous teeth, can have a genotoxic effect. Genotoxicity was tested in lymphocyte cultures from the peripheral blood of children aged 5-10y, in Recife, Pernambuco, Brazil. This was a case-control study. The sample comprised 40 children who had primary teeth with non-vital pulps. Two venous blood samples (6-8ml) were collected from each child, the first prior to pulp therapy (control group) and the second 24h after pulp therapy (experimental group). Lymphocyte cultures were grown in 78% RPMI 1640 medium, 20% fetal bovine serum, 2% phytohemagglutinin. The lymphocytes were assessed for chromosomal aberrations; each sample involved analysis of 100 metaphases. There was a statistically significant difference between the control and treated groups for the isochromatid gap (pformocresol in pediatric dentistry is recommended. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Cytotoxicity and genotoxicity assessment of Euphorbia hirta in MCF-7 cell line model using comet assay

    OpenAIRE

    Kwan Yuet Ping; Ibrahim Darah; Yeng Chen; Sreenivasan Sasidharan

    2013-01-01

    Objective: To evaluate the cytotoxicity and genotoxicity activity of Euphorbia hirta (E. hirta) in MCF-7 cell line model using comet assay. Methods: The cytotoxicity of E. hirta extract was investigated by employing brine shrimp lethality assay and the genotoxicity of E. hirta was assessed by using Comet assay. Results: Both toxicity tests exhibited significant toxicity result. In the comet assay, the E. hirta extract exhibited genotoxicity effects against MCF-7 DNA in a time-dependent m...

  8. Toxicity and genotoxicity of wastewater from gasoline stations

    OpenAIRE

    Oliveira-Martins, Cynthia R.; Grisolia, Cesar K.

    2009-01-01

    The toxicity and genotoxicity of wastewater from eight gasoline stations in Brasília, Brazil's capital city, was studied by assessing chromosomal aberrations, chromosomal malsegregation and the mitotic index in Allium cepa root cells, and the occurrence of micronucleus and nuclear abnormalities in peripheral erythrocytes of tilapia fish (Oreochromis niloticus). The content of gasoline station effluents was also analyzed based on several physico-chemical parameters. None of the wastewater samp...

  9. λ-cyhalothrin induced genotoxicity in freshwater fish Labeo rohita

    Directory of Open Access Journals (Sweden)

    P. D. Gadhave

    2014-06-01

    Full Text Available Aim: To study the genotoxicity of λ-cyhalothrin in Labeo rohita by determining the induction of micronuclei (MN in erythrocytes. Materials and Methods: The genotoxicity of to λ-cyhalothrin was studied using 300 Labeo rohita fingerlings with reference the guidelines of Organization for Economic Co-operation and Development (OECD 204 except the loading density which was higher than the recommended density 1.0 g/l to reduce the chemical loss. The disinfection and acclimation for 14 days were done at the site of experiment. Fish were divided into five groups of 20 fish each. Group I exposed to 0.27µg/l while Group II exposed to 0.054 µg/l of λ-cyhalothrin. There were three control groups, Group III contain only water, Group IV vehicle control with 0.27µg/l acetone and Group V positive control with 5 mg/l cyclophosphamide. The experiment was conducted in triplicate. Water quality parameters like temperature, pH, total hardness and total alkalinity were measured on every 15 days. Twenty litres of water from each aquaria was exchanged daily with water containing respective concentration of chemical to maintain water quality and chemical concentration. On 15th, 30th and 45th day blood was collected from four fish per aquaria and pooled to get two blood samples. Three blood smears were prepared from each blood sample and stained with Giemsa-Wright. For every blood smear MN frequency per 1000 erythrocytes was counted. Finally the MN assay was given as average frequency per group. Results: The highest frequency of MN was observed on 15th day in dose dependent manner. However there was time dependent decrease in frequency of MN on 30th and 45th day. Conclusions: λ-cyhalothrin was genotoxic to Labeo rohita and micronuclei assay is suitable for detecting genotoxicity of λ-cyhalothrin in Labeo rohita due to acute exposures.

  10. Monosodium glutamate is not likely to be genotoxic.

    Science.gov (United States)

    Rogers, Michael D

    2016-08-01

    The International Glutamate Technical Committee (IGTC) wishes to comment on a recent publication in the Journal entitled "Genotoxicity of monosodium glutamate" (authored by Ataseven N, Yüzbaşıoğlu D, Keskin AÇ and Ünal F) (Ataseven et al. 2016). In particular, we wish to highlight that, in our considered view, the results of this study were inappropriately discussed and that references were selectively used. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  12. Evaluation of river water genotoxicity using the piscine micronucleus test.

    Science.gov (United States)

    Ergene, Serap; Cavaş, Tolga; Celik, Ayla; Köleli, Nurcan; Aymak, Cemil

    2007-07-01

    The Berdan River, which empties into the Mediterranean Sea on the east coast of Turkey, receives discharges of industrial and municipal waste. In the present study, the in vivo piscine micronucleus (MN) test was used to evaluate the genotoxicity of water samples collected from different locations along the Berdan River. Nile tilapia (Oreochromis niloticus) were exposed in the laboratory for 2, 4, and 6 days, and micronuclei were evaluated in peripheral blood erythrocytes, gill cells, and caudal fin epithelial cells. A single dose of 5 mg/L cyclophosphamide was used as a positive control. In addition to micronuclei, nuclear abnormalities (NAs), such as binucleated cells and blebbed, notched, and lobed nuclei, were assessed in the erythrocytes, and chemical analyses were carried out to determine the amount of heavy metals in the water samples. MN and NA frequencies were significantly elevated (up to 2- to 3-fold) in fish exposed to river water samples taken downstream of potential discharges, and the elevated responses in gill and fin cells were related to the concentration of heavy metals in the water. MN frequencies (expressed as micronucleated cells/1,000 cells), in both treated and untreated fish, were greatest in gill cells (range: 0.80-3.70), and generally lower in erythrocytes (range: 0.50-2.80), and fin cells (range: 0.45-1.70). The results of this study indicate that the Berdan River is contaminated with genotoxic pollutants and that the genotoxicity is related to the discharge of wastes into the river water.

  13. Genotoxic potential and physicochemical parameters of Sinos River, southern Brazil.

    Science.gov (United States)

    Scalon, Madalena C S; Rechenmacher, Ciliana; Siebel, Anna Maria; Kayser, Michele L; Rodrigues, Manoela T; Maluf, Sharbel W; Rodrigues, Marco Antonio S; Silva, Luciano Basso da

    2013-01-01

    The present study aimed to evaluate the physicochemical parameters and the genotoxic potential of water samples collected in the upper, middle, and lower courses of the Sinos River, southern Brazil. The comet assay was performed in the peripheral blood of fish Hyphessobrycon luetkenii exposed under laboratory conditions to water samples collected in summer and winter in three sampling sites of Sinos River. Water quality analysis demonstrated values above those described in Brazilian legislation in Parobé and Sapucaia do Sul sites, located in the middle and in the lower courses of the Sinos River, respectively. The Caraá site, located in the upper river reach, presented all the physicochemical parameters in accordance with the allowed limits in both sampling periods. Comet assay in fish revealed genotoxicity in water samples collected in the middle course site in summer and in the three sites in winter when compared to control group. Thus, the physicochemical parameters indicated that the water quality of the upper course complies with the limits set by the national guidelines, and the ecotoxicological assessment, however, indicated the presence of genotoxic agents. The present study highlights the importance of combining water physicochemical analysis and bioassays to river monitoring.

  14. Genotoxic and cytotoxic effects of storax in vitro.

    Science.gov (United States)

    Karadeniz, Bulent; Ulker, Zeynep; Alpsoy, Lokman

    2013-03-01

    The aim of this study is to investigate the effects of the storax balsam, which is a kind of sweet gum obtained from the Liquidambar orientalis Mill trees, on cell viability, cytotoxicity and genotoxicity in human lymphocyte in vitro. We studied the genotoxic effects of the extract of storax balsam (SE) using sister chromatid exchange (SCE) test system. Also the cytotoxic and inhibitory effects on cell proliferation of SE were evaluated using lactate dehydrogenase (LDH) assay and cell proliferation (WST-1) assay. The SCE frequency was increased when the cells were treated with 1.6 and 4.0 µg/mL SE concentrations (p < 0.05). Moreover, treatment of the cells with the same concentrations significantly depleted the cell number at 24th and 48th hours and elevated the LDH levels (p < 0.05) at 48th hour. These results suggest that SE can be used as an alternative antibacterial and antipathogenic agent due to its cytotoxic and genotoxic effects.

  15. Borax counteracts genotoxicity of aluminum in rat liver.

    Science.gov (United States)

    Turkez, Hasan; Geyikoğlu, Fatime; Tatar, Abdulgani

    2013-10-01

    This study was carried out to evaluate the protective role of borax (BX) on genotoxicity induced by aluminum (Al) in rat liver, using liver micronucleus assay as an indicator of genotoxicity. Sprague-Dawley rats were randomly separated into six groups and each group had four animals. Aluminum chloride (AlCl₃; 5 mg/kg b.w.) and BX (3.25 and 13 mg/kg b.w.) were injected intraperitoneally to rats. Besides, animals were also treated with Al for 4 consecutive days followed by BX for 10 days. Rats were anesthetized after Al and BX injections and the hepatocytes were isolated for counting the number of micronucleated hepatocytes (MNHEPs). AlCl₃ was found to significantly (p < 0.05) increase the number of MNHEPs. Rats treated with BX, however, showed no increase in MNHEPs. Moreover, simultaneous treatments with BX significantly modulated the genotoxic effects of AlCl₃ in rats. It can be concluded that BX has beneficial influences and has the ability to antagonize Al toxicity.

  16. Poorly soluble cobalt oxide particles trigger genotoxicity via multiple pathways.

    Science.gov (United States)

    Uboldi, Chiara; Orsière, Thierry; Darolles, Carine; Aloin, Valérie; Tassistro, Virginie; George, Isabelle; Malard, Véronique

    2016-02-03

    Poorly soluble cobalt (II, III) oxide particles (Co3O4P) are believed to induce in vitro cytotoxic effects via a Trojan-horse mechanism. Once internalized into lysosomal and acidic intracellular compartments, Co3O4P slowly release a low amount of cobalt ions (Co(2+)) that impair the viability of in vitro cultures. In this study, we focused on the genotoxic potential of Co3O4P by performing a comprehensive investigation of the DNA damage exerted in BEAS-2B human bronchial epithelial cells. Our results demonstrate that poorly soluble Co3O4P enhanced the formation of micronuclei in binucleated cells. Moreover, by comet assay we showed that Co3O4P induced primary and oxidative DNA damage, and by scoring the formation of γ-H2Ax foci, we demonstrated that Co3O4P also generated double DNA strand breaks. By comparing the effects exerted by poorly soluble Co3O4P with those obtained in the presence of soluble cobalt chloride (CoCl2), we demonstrated that the genotoxic effects of Co3O4P are not simply due to the released Co(2+) but are induced by the particles themselves, as genotoxicity is observed at very low Co3O4P concentrations.

  17. Glycation promotes the formation of genotoxic aggregates in glucose oxidase.

    Science.gov (United States)

    Khan, Taqi Ahmed; Amani, Samreen; Naeem, Aabgeena

    2012-09-01

    This study investigates the effect of pentose sugars (ribose and arabinose) on the structural and chemical modifications in glucose oxidase (GOD) as well as genotoxic potential of this modified form. An intermediate state of GOD was observed on day 12 of incubation having CD minima peaks at 222 and 208 nm, characteristic of α-helix and a few tertiary contacts with altered tryptophan environment and high ANS binding. All these features indicate the existence of molten globule state of the GOD with ribose and arabinose on day 12. GOD on day 15 of incubation forms β structures as revealed by CD and FTIR which may be due to its aggregation. Furthermore, GOD on day 15 showed a remarkable increase in Thioflavin T fluorescence at 485 nm. Comet assay of lymphocytes and plasmid nicking assay in presence of glycated GOD show DNA damage which confirmed the genotoxicity of advance glycated end products. Hence, our study suggests that glycated GOD results in the formation of aggregates and the advanced glycated end products, which are genotoxic in nature.

  18. Genotoxic and apoptotic effects of Goeckerman therapy for psoriasis

    Energy Technology Data Exchange (ETDEWEB)

    Borska, L.; Andrys, C.; Krejsek, J.; Hamakova, K.; Kremlacek, J.; Palicka, V.; Ranna, D.; Fiala, Z. [Charles University Prague, Prague (Czech Republic). Faculty of Medicine

    2010-03-15

    Goeckerman therapy (GT) for psoriasis is based on cutaneous application of crude coal tar (polycyclic aromatic hydrocarbons (PAH)) and exposure to ultraviolet radiation (UVR). PAH and UVR are mutagenic, carcinogenic and immunotoxic agents that promote apoptosis. We evaluated dermal absorption of PAH as well as the genotoxic and apoptotic effects of GT in 20 patients with psoriasis, by determining numbers of chromosomal abnormalities in peripheral lymphocytes, and levels of 1-hydroxypyrene (1-OHP), p53 protein and soluble FasL (sFasL) in urine and/or blood, before and after GT. Psoriasis Area and Severity Index (PASI) score was used to evaluate clinical efficacy of GT. Compared with pre-treatment levels, there was a significant increase in urine 1-OHP, indicating a high degree of dermal absorption of PAH (P <0.01). We also found a significant increase in the number of chromosomal abnormalities in peripheral blood lymphocytes (P <0.001), suggesting that GT is genotoxic; significantly increased p53 protein in plasma (P <0.05), an indicator of cell response to DNA damage; and significantly increased sFasL in serum (P <0.01), an indicator of apoptosis. The PASI score was significantly decreased after GT (P <0.001), confirming clinical benefit of this treatment. Our results demonstrate high dermal absorption of PAH during GT and provide evidence that GT promotes genotoxicity and apoptosis.

  19. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  3. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  4. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  7. Quantitative genotoxicity assays for analysis of medicinal plants: A systematic review.

    Science.gov (United States)

    Sponchiado, Graziela; Adam, Mônica Lucia; Silva, Caroline Dadalt; Soley, Bruna Silva; de Mello-Sampayo, Cristina; Cabrini, Daniela Almeida; Correr, Cassyano Januário; Otuki, Michel Fleith

    2016-02-03

    Medicinal plants are known to contain numerous biologically active compounds, and although they have proven pharmacological properties, they can cause harm, including DNA damage. Review the literature to evaluate the genotoxicity risk of medicinal plants, explore the genotoxicity assays most used and compare these to the current legal requirements. A quantitative systematic review of the literature, using the keywords "medicinal plants", "genotoxicity" and "mutagenicity", was undertakenQ to identify the types of assays most used to assess genotoxicity, and to evaluate the genotoxicity potential of medicinal plant extracts. The database searches retrieved 2289 records, 458 of which met the inclusion criteria. Evaluation of the selected articles showed a total of 24 different assays used for an assessment of medicinal plant extract genotoxicity. More than a quarter of those studies (28.4%) reported positive results for genotoxicity. This review demonstrates that a range of genotoxicity assay methods are used to evaluate the genotoxicity potential of medicinal plant extracts. The most used methods are those recommended by regulatory agencies. However, based on the current findings, in order to conduct a thorough study concerning the possible genotoxic effects of a medicinal plant, we indicate that it is important always to include bacterial and mammalian tests, with at least one in vivo assay. Also, these tests should be capable of detecting outcomes that include mutation induction, clastogenic and aneugenic effects, and structural chromosome abnormalities. In addition, the considerable rate of positive results detected in this analysis further supports the relevance of assessing the genotoxicity potential of medicinal plants. Copyright © 2016. Published by Elsevier Ireland Ltd.

  8. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Science.gov (United States)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  9. Neuronal Rat Brain Damage Caused by Endogenous and Exogenous Hyperthermia

    Directory of Open Access Journals (Sweden)

    Mustafa Aydın

    2012-03-01

    Full Text Available OBJECTIVE: Hyperthermia may induce pathologic alterations within body systems and organs including brain. In this study, neuronal effects of endogenous and exogenous hyperthermia (41°C were studied in rats. METHODS: The endogenous hyperthermia (41°C was induced by lipopolysaccharide and the exogenous by an (electric heater. Possible neuronal damage was evaluated by examining healthy, apoptotic and necrotic cells, and heat shock proteins (HSP 27, HSP 70 in the cerebral cortex, cerebellum and hypothalamus RESULTS: At cellular level, when all neuronal tissues are taken into account; (i a significant increase in the necrotic cells was observed in the both groups (p0.05. CONCLUSION: The neural tissue of brain can show different degree of response to hyperthermia. But we can conclude that endogenous hyperthermia is more harmful to central nervous system than exogenous hyperthermia

  10. Dynamics of tuberculosis transmission with exogenous reinfections and endogenous reactivation

    Science.gov (United States)

    Khajanchi, Subhas; Das, Dhiraj Kumar; Kar, Tapan Kumar

    2018-05-01

    We propose and analyze a mathematical model for tuberculosis (TB) transmission to study the role of exogenous reinfection and endogenous reactivation. The model exhibits two equilibria: a disease free and an endemic equilibria. We observe that the TB model exhibits transcritical bifurcation when basic reproduction number R0 = 1. Our results demonstrate that the disease transmission rate β and exogenous reinfection rate α plays an important role to change the qualitative dynamics of TB. The disease transmission rate β give rises to the possibility of backward bifurcation for R0 < 1, and hence the existence of multiple endemic equilibria one of which is stable and another one is unstable. Our analysis suggests that R0 < 1 may not be sufficient to completely eliminate the disease. We also investigate that our TB transmission model undergoes Hopf-bifurcation with respect to the contact rate β and the exogenous reinfection rate α. We conducted some numerical simulations to support our analytical findings.

  11. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  14. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  15. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  16. Neuropsychiatric findings in Cushing syndrome and exogenous glucocorticoid administration.

    Science.gov (United States)

    Starkman, Monica N

    2013-09-01

    This article reviews the neuropsychiatric presentations elicited by spontaneous hypercortisolism and exogenous supraphysiologic glucocorticoids. Patients with Cushing disease and syndrome develop a depressive syndrome: irritable and depressed mood, decreased libido, disrupted sleep and cognitive decrements. Exogenous short-term glucocorticoid administration may elicit a hypomanic syndrome with mood, sleep and cognitive disruptions. Treatment options are discussed. Brain imaging and neuropsychological studies indicate elevated cortisol and other glucocorticoids are especially deleterious to hippocampus and frontal lobe. The research findings also shed light on neuropsychiatric abnormalities in conditions that have substantial subgroups exhibiting elevated and dysregulated cortisol: aging, major depressive disorder and Alzheimer's disease. Copyright © 2013 Elsevier Inc. All rights reserved.

  17. Complex patterns of synchrony in networks undergoing exogenous drive

    Science.gov (United States)

    Waddell, Jack; Zochowski, Michal

    2007-03-01

    It has been established that various exogenous oscillatory drives modulate neural activity (and potentially information processing) in the brain. We explore the effect of an exogenous drive on the spatio-temporal pattern formation of a network of coupled non-identical R"ossler oscillators. We investigate the formation and properties of the phase locked states, dependent on the network properties as well as those of the external drive. We have found that such drive has a complex effect on the pattern formation in the network, depending on the coupling strength between the oscillators, drive strength as well as its frequency relative to the oscillators.

  18. Genotoxicity of metal based engineered nanoparticles in aquatic organisms: A review

    CSIR Research Space (South Africa)

    Mahaye, Ntombikayise

    2017-07-01

    Full Text Available on how these challenges might be addressed. We review the application of eight different genotoxicity assays, where the Comet Assay is generally preferred due to its capacity to detect low levels of DNA damage. Most ENPs have been shown to cause genotoxic...

  19. Proteome-wide Identification of Poly(ADP-Ribosyl)ation Targets in Different Genotoxic Stress Responses

    DEFF Research Database (Denmark)

    Jungmichel, S.; Rosenthal, F.; Altmeyer, M.

    2013-01-01

    . Nuclear proteins encompassing nucleic acid binding properties are prominently PARylated upon genotoxic stress, consistent with the nuclear localization of ARTD1/PARP1 and ARTD2/PARP2. Distinct differences in proteins becoming PARylated upon various genotoxic insults are observed, exemplified...

  20. GENOTOXICITY OF TEN CIGARETTE SMOKE CONDENSATES IN FOUR TEST SYSTEMS: COMPARISONS AMONG ASSAYS AND CONDENSATES

    Science.gov (United States)

    The particulate fraction of cigarette smoke, cigarette smoke condensate (CSC), is genotoxic in many short-term in vitro tests and carcinogenic in rodents. However, no study has evaluatedd a set of CSCs prepared from a diverse set of cigarettes in a variety of short-term genotoxic...

  1. Primary genotoxicity in the liver following pulmonary exposure to carbon black nanoparticles in mice

    DEFF Research Database (Denmark)

    Modrzynska, Justyna; Berthing, Trine; Ravn-Haren, Gitte

    2018-01-01

    Background Little is known about the mechanism underlying the genotoxicity observed in the liver following pulmonary exposure to carbon black (CB) nanoparticles (NPs). The genotoxicity could be caused by the presence of translocated particles or by circulating inflammatory mediators released during...

  2. Photodegradation of 2-chloropyridine in aqueous solution: Reaction pathways and genotoxicity of intermediate products.

    Science.gov (United States)

    Skoutelis, Charalambos; Antonopoulou, Maria; Konstantinou, Ioannis; Vlastos, Dimitris; Papadaki, Maria

    2017-01-05

    2-Chloropyridine, an important precursor of the chemical industry is also a persistent water pollutant. The genotoxicity of photolytically treated 2-chloropyridine aqueous solution to human lymphocytes initially increases and fluctuates during treatment finally reaching the control values after prolonged treatment. Intermediate products formed were identified; a kinetic scheme for their formation is presented. To identify the source of genotoxicity variations and the potential in vitro effects on human lymphocytes of the partially photo-treated aqueous solution, the genotoxicity of four (the only) commercially available intermediates, i.e., 1H-pyrrole-2-carboxaldehyde, 6-chloro-2-pyridinecarboxylic acid, 2,3-dichloropyridine and 2-pyridinecarbonitrile was measured; the obtained results were used for the reasoning on the variation of the solution genotoxic (including clastogenic as well as aneugenic) events and cytotoxic activity. It was found that 1H-pyrrole-2-carboxaldehyde and 6-chloro-2-pyridinecarboxylic acid were highly genotoxic even at the very low concentration measured here. Thus, they likely had a significant contribution to the photolytically treated solution genotoxicity. 2,3-Dichloropyridine was found to be genotoxic but only at concentrations higher than the ones measured in this work. Thus, it was not likely to have contributed to the solution genotoxicity. Finally, at the concentrations measured in this work 2-pyridinecarbonitrile was found to be only cytotoxic. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Lack of genotoxicity in vivo for food color additive Tartrazine.

    Science.gov (United States)

    Bastaki, Maria; Farrell, Thomas; Bhusari, Sachin; Pant, Kamala; Kulkarni, Rohan

    2017-07-01

    Tartrazine is approved as a food color additive internationally with INS number 102, in the United States as food color subject to batch certification "Food, Drug, and Cosmetic" (FD&C) Yellow No. 5, and in Europe as food color additive with E number 102. In their evaluation of the color (2013), the European Food Safety Authority (EFSA) expressed concerns of potential genotoxicity, based primarily on one genotoxicity study that was not conducted according to Guidelines. The present in vivo genotoxicity study was conducted according to OECD Guidelines in response to EFSA's request for additional data. The animal species and strain, and the tissues examined were selected specifically to address the previously reported findings. The results of this study show clear absence of genotoxic activity for Tartrazine, in the bone marrow micronucleus assay and the Comet assay in the liver, stomach, and colon. These data addressed EFSA's concerns for genotoxicity. The Joint WHO/FAO Committee on Food Additives (JECFA) (2016) also reviewed these data and concluded that there is no genotoxicity concern for Tartrazine. Negative findings in parallel genotoxicity studies on Allura Red AC and Ponceau 4R (published separately) are consistent with lack of genotoxicity for azo dyes used as food colors. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... for heart attack? I've read that calcium supplements may increase the risk of heart attack. Is ... Some doctors think it's possible that taking calcium supplements may increase your risk of a heart attack. ...

  5. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  6. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Science.gov (United States)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  7. Screening potential genotoxic effect of aquatic plant extracts using the mussel micronucleus test

    Directory of Open Access Journals (Sweden)

    Bettina Eck-Varanka

    2016-01-01

    Full Text Available Objective: To assess the genotoxic potential of selected aquatic macrophytes: Ceratophyllum demersum L. (hornwort, family Ceratophyllaceae, Typha angustifolia L. (narrowleaf cattail, family Typhaceae, Stratiotes aloides L. (water soldier, family Butomaceae, and Oenanthe aquatica (L. Poir. (water dropwort, family Umbelliferae. Methods: For genotoxicity assessment, the mussel micronucleus test was applied. Micronucleus frequency was determined from the haemolymph of Unio pictorum L. (painter’s mussel. In parallel, total and hydrolisable tannin contents were determined. Results: All plant extracts elucidated significant mutagenic effect. Significant correlation was determined between tannin content and mutagenic capacity. Conclusions: The significant correlation between genotoxicity as expressed by micronucleus frequency and tannin content (both total and hydrolisable tannins indicate that tannin is amongst the main compounds being responsible for the genotoxic potential. It might be suggested that genotoxic capacity of these plants elucidate a real ecological effect in the ecosystem.

  8. The Comet Assay for the Evaluation of Genotoxic Potential of Landfill Leachate

    Directory of Open Access Journals (Sweden)

    Kamila Widziewicz

    2012-01-01

    Full Text Available Genotoxic assessment of landfill leachate before and after biological treatment was conducted with two human cell lines (Me45 and NHDF and Daphnia magna somatic cells. The alkali version of comet assay was used to examine genotoxicity of leachate by DNA strand breaks analysis and its repair dynamics. The leachate samples were collected from Zabrze landfill, situated in the Upper Silesian Industrial District, Poland. Statistically significant differences (Kruskal-Wallice ANOVA rank model were observed between DNA strand breaks in cells incubated with leachate before and after treatment (P<0.001. Nonparametric Friedman ANOVA confirmed time-reliable and concentration-reliable cells response to leachate concentration. Examinations of chemical properties showed a marked decrease in leachate parameters after treatment which correlate to reduced genotoxicity towards tested cells. Obtained results demonstrate that biological cotreatment of leachate together with municipal wastewater is an efficient method for its genotoxic potential reduction; however, treated leachate still possessed genotoxic character.

  9. The Food Contaminant Deoxynivalenol Exacerbates the Genotoxicity of Gut Microbiota

    Directory of Open Access Journals (Sweden)

    Delphine Payros

    2017-03-01

    Full Text Available An increasing number of human beings from developed countries are colonized by Escherichia coli strains producing colibactin, a genotoxin suspected to be associated with the development of colorectal cancers. Deoxynivalenol (DON is the most prevalent mycotoxin that contaminates staple food—especially cereal products—in Europe and North America. This study investigates the effect of the food contaminant DON on the genotoxicity of the E. coli strains producing colibactin. In vitro, intestinal epithelial cells were coexposed to DON and E. coli producing colibactin. In vivo, newborn rats colonized at birth with E. coli producing colibactin were fed a DON-contaminated diet. Intestinal DNA damage was estimated by the phosphorylation of histone H2AX. DON exacerbates the genotoxicity of the E. coli producing colibactin in a time- and dose-dependent manner in vitro. Although DON had no effect on the composition of the gut microbiota, and especially on the number of E. coli, a significant increase in DNA damage was observed in intestinal epithelial cells of animals colonized by E. coli strains producing colibactin and coexposed to DON compared to animals colonized with E. coli strains unable to produce colibactin or animals exposed only to DON. In conclusion, our data demonstrate that the genotoxicity of E. coli strains producing colibactin, increasingly present in the microbiota of asymptomatic human beings, is modulated by the presence of DON in the diet. This raises questions about the synergism between food contaminants and gut microbiota with regard to intestinal carcinogenesis.

  10. Microbial metabolite of dimethylarsinic acid is highly toxic and genotoxic

    International Nuclear Information System (INIS)

    Kuroda, Koichi; Yoshida, Kaoru; Yoshimura, Mieko; Endo, Yoko; Wanibuchi, Hideki; Fukushima, Shoji; Endo, Ginji

    2004-01-01

    Dimethylarsinic acid [DMA, (CH 3 ) 2 AsO(OH)] causes cancer in the urinary bladder of rats. However, its mechanism of cancer or the ultimate carcinogenic form is not yet known. Rats administered dimethylarsinic acid excrete three unknown arsenic compounds (termed M-1, M-2, and M-3) in urine or feces, and these compounds are presumed to be produced by intestinal bacteria. Escherichia coli A3-6 isolated from a rat yielded two unknown arsenic compounds (M-2 and M-3) from dimethylarsinic acid and M-1 from trimethylarsine oxide (TMAO) in the presence of cysteine (Cys). Contents of M-2 and M-3 varied with cysteine concentration. The cytotoxicity and genotoxicity of the bacteria-free solution of dimethylarsinic acid or trimethylarsine oxide metabolized by E. coli A3-6 were studied using V79 cells. Dimethylarsinic acid (1 mM) metabolized by E. coli A3-6 in the presence of cysteine (1 mM) was highly cytotoxic (50% survival reduction concentration; 2.1 μM As) in V79 cells, and the toxic substance appeared to be M-2. The metabolite solution (at 2.5-10 μM total As) induced c-mitosis and tetraploids, and caused mitotic arrest, since it increased mitotic cells at the cytotoxic dose. The metabolite solution also significantly increased sister chromatid exchange (SCE) and chromosomal aberrations, most of which were chromatid gaps and chromatid breaks. A3-6 converted 96.1% of trimethylarsine oxide to M-1 in the presence of cysteine. This metabolite solution did not exhibit cytotoxicity or genotoxicity. The reported M-2 concentration in urine of rats administered levels of DMA via drinking water known to cause bladder tumors was sufficient to exhibit cytotoxic and genotoxic effects in urinary bladder. Thus, we hypothesize that intestinal bacteria play an important role in carcinogenicity of dimethylarsinic acid

  11. Toxicity and genotoxicity evaluation of Passiflora alata Curtis (Passifloraceae).

    Science.gov (United States)

    Boeira, Jane M; Fenner, Raquel; Betti, Andresa H; Provensi, Gustavo; Lacerda, Luciana de A; Barbosa, Patrícia R; González, Félix H D; Corrêa, André M R; Driemeier, David; Dall'Alba, Marília P; Pedroso, Annelise P; Gosmann, Grace; da Silva, Juliana; Rates, Stela M K

    2010-03-24

    Passiflora alata is an official species of Brazilian Pharmacopoeia and its aerial parts are used as medicinal plant by local population as well as constitutes many phytomedicines commercialized in Brazil as sedative. To evaluate the acute and sub-acute toxicity and genotoxicity of an aqueous spray-dried extract (PA) of Passiflora alata (2.6% flavonoids). The acute and the sub-acute toxicity was evaluated in mice and rats, respectively. Behavioural, biochemical, hematological, histological and urine parameters were considered. Genotoxicity was assessed by using micronucleus test performed in peripheral blood and bone marrow cells and comet assay in peripheral blood leukocytes. Mice deaths were not observed up to 4800 mg/kg, p.o., single dose. Rats treated with aqueous extract at dose of 300 mg/kg, p.o., for 14 days did not present biochemical, hematological or histopathological significant alterations when compared to control group. However, these rats showed signs of irritability and did not show weight gain. In addition, mice acutely treated with extract 150, 300 and 600 mg/kg, p.o., presented DNA damage determined by comet assay in peripheral blood cells 3h after treatment. The effect of lower doses (12.5, 25 and 50mg/kg, p.o.) was evaluated at 3, 6 and 24h after treating. Only PA 50mg/kg (p.o.) induced significant damage at 3 and 6h. The maximum damage induction was observed at 6h. When the animals received PA 12.5, 25 or 50mg/kg/day during 3 days (i.e., 72h treatment) DNA damage (comet and micronucleus tests) increased significantly in a dose-dependent manner. In conclusion Passiflora alata presented genotoxic effect and deserves further toxicity evaluation in order to guarantee its safety for human use. Copyright (c) 2010. Published by Elsevier Ireland Ltd.

  12. The comet assay in testing the potential genotoxicity of nanomaterials

    Directory of Open Access Journals (Sweden)

    Amaya Azqueta

    2015-06-01

    Full Text Available In the last two decades the production and use of nanomaterials (NMs has impressively increased. Their small size, given a mass equal to that of the corresponding bulk material, implies an increase in the surface area and consequently in the number of atoms that can be reactive. They possess different physical, chemical and biological properties compared to bulk materials of the same composition, which makes them very interesting and valuable for many different applications in technology, energy, construction, electronics, agriculture, optics, paints, textiles, food, cosmetics, medicine... Toxicological assessment of NMs is crucial; the same properties that make them interesting also make them potentially harmful for health and the environment. However, the term NM covers many different kinds of particle , and so there is no simple, standard approach to assessing their toxicity. NMs can enter the cell, interact with cell components and even penetrate the nucleus and interfere with the genetic material. Among the different branches of toxicology, genotoxicity is a main area of concern since it is closely related with the carcinogenic potential of compounds. The Organisation for Economic Co-operation and Development (OECD has published internationally agreed in vitro and in vivo validated test methods to evaluate different genotoxic endpoints of chemicals, including chromosome and gene mutations, and DNA breaks. However not all the assays are suitable to study the genotoxic potential of NMs as has been shown by the OECD Working Party on Manufactured Nanomaterials (WPMN. Moreover, alterations to DNA bases, which are precursors to mutations and of great importance in elucidating the mechanism of action of NMs, are not covered by the OECD guidelines. The in vivo standard comet assay (which measures DNA breaks and alkali-labile sites was included in the OECD assays battery in September 2014 while the in vitro standard comet assay is currently under

  13. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  14. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  16. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  17. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  18. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  19. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  1. Joint Warfighting: Attacking Time-Critical Targets

    National Research Council Canada - National Science Library

    Lewis, Jerry

    2001-01-01

    .... While DOD has developed and fielded considerable capability to detect, assess, and attack most fixed enemy targets, experiences in the Persian Gulf and more recently in Kosovo revealed that DOD...

  2. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  3. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  4. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  5. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  6. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  7. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  8. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  9. Enhanced antioxidant defense after exogenous application of Ca 2+ ...

    African Journals Online (AJOL)

    Both of these nutrients play an important role in ameliorating drought stress in crop plants. This experiment was designed to study whether exogenous application of Ca2+ and K+ before the drought could enhance the potential of plants to survive under limiting water conditions. Brassica napus L. cv Bulbul-98 seedlings ...

  10. Optimizing Multireservoir System Operating Policies Using Exogenous Hydrologic Variables

    Science.gov (United States)

    Pina, Jasson; Tilmant, Amaury; Côté, Pascal

    2017-11-01

    Stochastic dual dynamic programming (SDDP) is one of the few available algorithms to optimize the operating policies of large-scale hydropower systems. This paper presents a variant, called SDDPX, in which exogenous hydrologic variables, such as snow water equivalent and/or sea surface temperature, are included in the state space vector together with the traditional (endogenous) variables, i.e., past inflows. A reoptimization procedure is also proposed in which SDDPX-derived benefit-to-go functions are employed within a simulation carried out over the historical record of both the endogenous and exogenous hydrologic variables. In SDDPX, release policies are now a function of storages, past inflows, and relevant exogenous variables that potentially capture more complex hydrological processes than those found in traditional SDDP formulations. To illustrate the potential gain associated with the use of exogenous variables when operating a multireservoir system, the 3,137 MW hydropower system of Rio Tinto (RT) located in the Saguenay-Lac-St-Jean River Basin in Quebec (Canada) is used as a case study. The performance of the system is assessed for various combinations of hydrologic state variables, ranging from the simple lag-one autoregressive model to more complex formulations involving past inflows, snow water equivalent, and winter precipitation.

  11. The use of exogenous microbial species to enhance the ...

    African Journals Online (AJOL)

    ABSTRACT. The objective of this study was to determine whether inoculating a hybrid fixed-film bioreactor with exogenous bacterial and diatoma species would increase the removal of chemical oxygen demand, nitrogenous compounds and suspended solids from a real-time coal gasification wastewater to meet ...

  12. Metabolic response to exogenous ethanol in yeast: An in vivo ...

    Indian Academy of Sciences (India)

    2012-08-02

    Aug 2, 2012 ... exogenous ethanol on the Saccharomyces cerevisiae fermentative metabolism. We show that the STOCSY analysis correctly identifies the different types of correlations among the enriched metabolites involved in the fermentation, and that these correlations are quite stable even in presence of a stressing ...

  13. Inheritance and segregation of exogenous genes in transgenic cotton

    Indian Academy of Sciences (India)

    were not damaged by bollworms. The results (table 1) indicate that they are all insect-resistant plants. The results confirm that the insect-resistance character controlled by the exogenous Bt gene is a dominant character. It did not matter whether the transgenic insect-resistant cotton cultivars CCRI 30 and NewCott 33B were ...

  14. Do endogenous and exogenous action control compete for perception?

    Science.gov (United States)

    Pfister, Roland; Heinemann, Alexander; Kiesel, Andrea; Thomaschke, Roland; Janczyk, Markus

    2012-04-01

    Human actions are guided either by endogenous action plans or by external stimuli in the environment. These two types of action control seem to be mediated by neurophysiologically and functionally distinct systems that interfere if an endogenously planned action suddenly has to be performed in response to an exogenous stimulus. In this case, the endogenous representation has to be deactivated first to give way to the exogenous system. Here we show that interference of endogenous and exogenous action control is not limited to motor-related aspects but also affects the perception of action-related stimuli. Participants associated two actions with contingent sensory effects in learning blocks. In subsequent test blocks, preparing one of these actions specifically impaired responding to the associated effect in an exogenous speeded detection task, yielding a blindness-like effect for arbitrary, learned action effects. In accordance with the theory of event coding, this finding suggests that action planning influences perception even in the absence of any physical similarities between action and to-be-perceived stimuli.

  15. Exogenous application of natural extracts of persimmon (Diospyros ...

    African Journals Online (AJOL)

    SAM

    2014-05-28

    May 28, 2014 ... as compared to the commercially available synthetic preservatives. Key words: Exogenous application, natural ... Sulfur dioxide remained in food causes asthma or allergic reaction to some people. To reduce ... competitiveness of harmful chemical-free persimmon products. MATERIALS AND METHODS.

  16. Postharvest responses of cut Dendrobium orchids to exogenous ...

    African Journals Online (AJOL)

    Yomi

    2012-02-23

    Feb 23, 2012 ... The time to senescence of flowers in Dendrobium hybrids is different and one of the major reasons for this variation in vase life can be related to differences in the level of ethylene sensitivity. This study was conducted to determine the sensitivity of six cut Dendrobium hybrids to exogenous ethylene. The cut.

  17. Diuretic action of exogenous hydrogen sulfide in spontaneously ...

    African Journals Online (AJOL)

    Diuretic action of exogenous hydrogen sulfide in spontaneously hypertensive diabetic rats. F ud Din Ahmad, MA Sattar, HA Rathore, S Akhter, O Hui Jin, EJ Johns. Abstract. Purpose: To examine the hypothesis that in hypertensive diabetic rats hydrogen sulphide (H2S) reduces blood pressure through diuretic action in ...

  18. Offshoring as an Exogenous Shock to the Services Production System

    DEFF Research Database (Denmark)

    Brandl, Kristin; Mol, Michael; Petersen, Bent

    Production of services involves three key elements, an output for the client, resources of a provider and task execution. Offshoring of services acts as an exogenous shock to such a production system. Using multiple case methodology we investigate how task output, execution, and resources change...

  19. Effects of whey, molasses and exogenous enzymes on the ensiling ...

    African Journals Online (AJOL)

    Ensiling maize cobs with molasses, whey and exogenous enzymes resulted in lower DM and fibre levels in the maize cobs, which could enhance intake and digestibility of nutrients when offered to pigs as a component of a balanced diet. Further investigations using higher concentrations of whey and molasses are ...

  20. Endogenous versus exogenous growth factor regulation of articular chondrocytes.

    Science.gov (United States)

    Shi, Shuiliang; Chan, Albert G; Mercer, Scott; Eckert, George J; Trippel, Stephen B

    2014-01-01

    Anabolic growth factors that regulate the function of articular chondrocytes are candidates for articular cartilage repair. Such factors may be delivered by pharmacotherapy in the form of exogenous proteins, or by gene therapy as endogenous proteins. It is unknown whether delivery method influences growth factor effectiveness in regulating articular chondrocyte reparative functions. We treated adult bovine articular chondrocytes with exogenous recombinant insulin-like growth factor-I (IGF-I) and transforming growth factor-beta1 (TGF-β1), or with the genes encoding these growth factors for endogenous production. Treatment effects were measured as change in chondrocyte DNA content, glycosaminoglycan production, and aggrecan gene expression. We found that IGF-I stimulated chondrocyte biosynthesis similarly when delivered by either exogenous or endogenous means. In contrast, exogenous TGF-β1 stimulated these reparative functions, while endogenous TGF-β1 had little effect. Endogenous TGF-β1 became more bioactive following activation of the transgene protein product. These data indicate that effective mechanisms of growth factor delivery for articular cartilage repair may differ for different growth factors. In the case of IGF-I, gene therapy or protein therapy appear to be viable options. In contrast, TGF-β1 gene therapy may be constrained by a limited ability of chondrocytes to convert latent complexes to an active form. Published 2013 by Wiley Periodicals, Inc. on behalf of the Orthopaedic Research Society. This article is a U.S. Government work and is in the public domain in the USA.

  1. Exogenous bridging and nonbridging in Cu(II) complexes of ...

    Indian Academy of Sciences (India)

    Unknown

    This observation is in contrast with similar studies with other binucleating ligands in which mono (µ-acetato) ... dinitrite complex (4) in which there is no exogenous bridging between the two Cu(II) atoms. The lack of ... possess only an endogenous phenolate (or alcoholate) bridging oxygen atom 6–10. Suzuki et al 6 and ...

  2. Metabolic response to exogenous ethanol in yeast: An in vivo ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Biosciences; Volume 37; Issue 4. Metabolic response to exogenous ethanol in yeast: An in vivo statistical total correlation NMR spectroscopy approach. Maso Ricci Marianna Aggravi Claudia Bonechi Silvia Martini Anna Maria Claudio Rossi. Articles Volume 37 Issue 4 September 2012 pp 749- ...

  3. Exogenous ethylene inhibits sprout growth in onion bulbs

    Science.gov (United States)

    Bufler, Gebhard

    2009-01-01

    Background and Aims Exogenous ethylene has recently gained commercial interest as a sprouting inhibitor of onion bulbs. The role of ethylene in dormancy and sprouting of onions, however, is not known. Methods A cultivar (Allium cepa ‘Copra’) with a true period of dormancy was used. Dormant and sprouting states of onion bulbs were treated with supposedly saturating doses of ethylene or with the ethylene-action inhibitor 1-methylcyclopropene (1-MCP). Initial sprouting was determined during storage at 18 °C by monitoring leaf blade elongation in a specific size class of leaf sheaths. Changes in ATP content and sucrose synthase activity in the sprout leaves, indicators of the sprouting state, were determined. CO2 and ethylene production of onion bulbs during storage were recorded. Key results Exogenous ethylene suppressed sprout growth of both dormant and already sprouting onion bulbs by inhibiting leaf blade elongation. In contrast to this growth-inhibiting effect, ethylene stimulated CO2 production by the bulbs about 2-fold. The duration of dormancy was not significantly affected by exogenous ethylene. However, treatment of dormant bulbs with 1-MCP caused premature sprouting. Conclusions Exogenous ethylene proved to be a powerful inhibitor of sprout growth in onion bulbs. The dormancy breaking effect of 1-MCP indicates a regulatory role of endogenous ethylene in onion bulb dormancy. PMID:18940850

  4. Do Endogenous and Exogenous Action Control Compete for Perception?

    Science.gov (United States)

    Pfister, Roland; Heinemann, Alexander; Kiesel, Andrea; Thomaschke, Roland; Janczyk, Markus

    2012-01-01

    Human actions are guided either by endogenous action plans or by external stimuli in the environment. These two types of action control seem to be mediated by neurophysiologically and functionally distinct systems that interfere if an endogenously planned action suddenly has to be performed in response to an exogenous stimulus. In this case, the…

  5. Exogenous cycilc AMP and cycilc GMP influence the metabolism of ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-09-01

    Sep 1, 2009 ... To characterize the dynamic distribution and metabolism of endogenous glycerol in vivo, the exogenous glycerol labeled by ... endogenous tracers for the study of protein and lipid metabolism since mid 1980s (Cryer et al., 1985; ..... of a defined muscle and fat co-culture system. Tiss. cell Res. 29: 517-. 524.

  6. Effect of exogenous application of salicylic acid on proline ...

    African Journals Online (AJOL)

    Therefore, during the exogenously applied SA to salt stress, proline metabolism was significantly altered and the extent of alteration varied between the SA and salt stress, leading to the maintenance of the turgor by accumulating higher levels of free proline accumulation in C. recutita, supporting its protection from salt ...

  7. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    OpenAIRE

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineer...

  8. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  9. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  10. Nanoceria have no genotoxic effect on human lens epithelial cells

    Energy Technology Data Exchange (ETDEWEB)

    Pierscionek, Barbara K; Yasseen, Akeel A [School of Biomedical Sciences, University of Ulster, Coleraine, BT52 1SA (United Kingdom); Li, Yuebin; Schachar, Ronald A; Chen, Wei [Department of Physics, University of Texas at Arlington, Arlington, TX 76019 (United States); Colhoun, Liza M, E-mail: b.pierscionek@ulster.ac.uk, E-mail: weichen@uta.edu [Centre for Vision and Vascular Sciences, School of Medicine, Dentistry and Biomedical Sciences, Queen' s University Belfast, Grosvenor Road, Belfast, BT12 6BA (United Kingdom)

    2010-01-22

    There are no treatments for reversing or halting cataract, a disease of the structural proteins in the eye lens, that has associations with other age-related degenerative conditions such as Alzheimer's disease. The incidence of cataract and associated conditions is increasing as the average age of the population rises. Protein folding diseases are difficult to assess in vivo as proteins and their age-related changes are assessed after extraction. Nanotechnology can be used to investigate protein changes in the intact lens as well as for a potential means of drug delivery. Nanoparticles, such as cerium oxide (CeO{sub 2}) which have antioxidant properties, may even be used as a means of treating cataract directly. Prior to use in treatments, nanoparticle genotoxicity must be tested to assess the extent of any DNA or chromosomal damage. Sister chromatid exchanges were measured and DNA damage investigated using the alkaline COMET assay on cultured human lens epithelial cells, exposed to 5 and 10 {mu}g ml{sup -1} of CeO{sub 2} nanoparticles (nanoceria). Nanoceria at these dosages did not cause any DNA damage or significant increases in the number of sister chromatid exchanges. The absence of genotoxic effects on lens cells suggests that nanoceria, in the doses and exposures tested in this study, are not deleterious to the eye lens and have the potential for use in studying structural alterations, in developing non-surgical cataract treatments and in investigating other protein folding diseases.

  11. Argentine folk medicine: genotoxic effects of Chenopodiaceae family.

    Science.gov (United States)

    Gadano, A B; Gurni, A A; Carballo, M A

    2006-01-16

    Chenopodium ambrosioides L. and Chenopodium multifidum L. (Chenopodiaceae), common name: Paico, are medicinal plants. They are aromatic shrubs growing in South America. For centuries, they have been used due to its medicinal properties. However, there are few reports in literature about the genotoxic effects of these plants. There for, the aim of these work is the evaluation of genetic damage induced by decoction and infusion of this plants which were assayed in different concentrations (1, 10, 100, 1,000 microL extract/mL culture), by addition of the extract to human lymphocyte cell cultures, negative controls were included. The endpoints evaluated were chromosomal aberrations (CA), sister chromatid exchanges (SCE), cell proliferation kinetics (CPK) and mitotic index (MI). The repeated measure analysis of variance was used for statistic evaluation of the results. The results showed: (a) statistical increase in the percentage of cells with CA and in the frequency of SCE when cultures were exposed to both aromatic plants, (b) a decrease in MI of both Paicos assayed, although no modification in the CPK values was observed, (c) no effect was noticed in the analysis of Chenopodium album L., which was used as negative control of the essential oil. These results suggest a cyto and genotoxic effect of Chenopodium ambrosioides and Chenopodium multifidum aqueous extracts related to the essential oil of the plant (as Chenopodium album did not perform).

  12. Biomonitoring of genotoxic exposure among stainless steel welders

    DEFF Research Database (Denmark)

    Knudsen, Lisbeth E.; Boisen, T; Christensen, J M

    1992-01-01

    A biosurvey in the Danish metal industry measured the genotoxic exposure from stainless steel welding. The study comprised measurements of chromosomal aberrations (CA), sister-chromatid exchanges (SCE), unscheduled DNA synthesis (UDS) in peripheral lymphocytes and serum immunoglobulin G. Environm......A biosurvey in the Danish metal industry measured the genotoxic exposure from stainless steel welding. The study comprised measurements of chromosomal aberrations (CA), sister-chromatid exchanges (SCE), unscheduled DNA synthesis (UDS) in peripheral lymphocytes and serum immunoglobulin G....... Environmental monitoring of welding fumes and selected metal oxides, biomonitoring of chromium and nickel in serum and urine and mutagenic activity in urine, and evaluation of semen quality were also done. Manual metal arc (MMA) welding and tungsten inert gas (TIG) welding were the dominant welding processes...... lymphocytes in exposed persons compared with non-exposed are suggested. MMA welding gave the highest exposure to chromium, an increased number of chromosomal aberrations and a decrease in SCE when compared with TIG welding. Consequently improvements in the occupational practice of stainless steel welding...

  13. Evaluation of genotoxic effect of amalgam restorations in oral cavity

    Directory of Open Access Journals (Sweden)

    Chennoju Sai Kiran

    2015-01-01

    Full Text Available Background: Mercury a popular heavy metal used in dentistry in the form of amalgam is a known clastogen. The assessment of micronuclei in cells is a promising tool for studying the genotoxic effect of mercury on them. Hence, a study was conducted to evaluate the frequency of micronuclei in exfoliated buccal cells of subjects with amalgam restorations. Materials and Methods: A total of 60 subjects (age and gender-matched sample of 30 study group and 30 control group were included in this study. Smears were obtained with moistened wooden spatula from buccal mucosa in close contact with amalgam restoration and fixed with 100% ethyl alcohol. After staining with Papanicolaou stain, all the slides were examined under ×40 and 1,000 cells were counted for the presence of micronuclei. The data were entered into a spread sheet and subjected to statistical analysis. Results: A statistically significant increase in the number of micronuclei containing cells was observed in the study group when compared to control group (P < 0.05. A positive correlation was observed between the duration of restoration and frequency of micronuclei (P < 0.05. Conclusion: The results showed a definite genotoxic effect of amalgam restorations on the oral cavity which can be attributed to the clastogenic action of mercury in amalgam restorations.

  14. Evaluation of environmental genotoxicity by comet assay in Columba livia.

    Science.gov (United States)

    González-Acevedo, Anahi; García-Salas, Juan A; Gosálvez, Jaime; Fernández, José Luis; Dávila-Rodríguez, Martha I; Cerda-Flores, Ricardo M; Méndez-López, Luis F; Cortés-Gutiérrez, Elva I

    2016-01-01

    The concentrations of recognized or suspected genotoxic and carcinogenic agents found in the air of large cities and, in particular, developing countries, have raised concerns about the potential for chronic health effects in the populations exposed to them. The biomonitoring of environmental genotoxicity requires the selection of representative organisms as "sentinels," as well as the development of suitable and sensitive assays, such as those aimed at assessing DNA damage. The aim of this study was to evaluate DNA damage levels in erythrocytes from Columba livia living in the metropolitan area of Monterrey, Mexico, compared with control animals via comet assay, and to confirm the results via Micronuclei test (MN) and DNA breakage detection-fluorescence in situ hybridization (DBD-FISH). Our results showed a significant increase in DNA migration in animals from the area assayed compared with that observed in control animals sampled in non-contaminated areas. These results were confirmed by MN test and DBD-FISH. In conclusion, these observations confirm that the examination of erythrocytes from Columba livia via alkaline comet assay provides a sensitive and reliable end point for the detection of environmental genotoxicants.

  15. Cytotoxic, genotoxic and mutagenic potential of UHT whole milk

    Directory of Open Access Journals (Sweden)

    Brenda de Lima CARVALHO

    Full Text Available Abstract This study evaluated the action at the cellular level of long life whole milk, full type of six renowned companies operating in the Brazilian market, as well as in other South American countries. The evaluation was performed using root meristem cells of Allium cepa L., at exposure times 24 and 48 hours, directly in milk products marketed. The results indicated that all the milk samples reduced root meristem cell proliferation, proving, in this study, a significant cytotoxic effect. Still, exposure to milk resulted in a significant frequency of mitotic spindle changes in meristem cells, characterizing these foods as genotoxic and mutagenic under the study conditions. It can be concluded that the long life milk samples caused significant genetic instability to cells of the examined tissue. The results obtained for cytotoxic, mutagenic and genotoxic action of these long life milks are of great relevance because, to date, there are no published toxicity studies on such foods and food additives present in the composition.

  16. Comparative Genotoxicity of Cadmium and Lead in Earthworm Coelomocytes

    Directory of Open Access Journals (Sweden)

    Ptumporn Muangphra

    2011-01-01

    Full Text Available To determine genotoxicity to coelomocytes, Pheretima peguana earthworms were exposed in filter paper studies to cadmium (Cd and lead (Pb for 48 h, at concentrations less than the LC10—Cd: 0.09, 0.19, 0.38, 0.75, and 1.50 μg cm−2; Pb: 1.65, 3.29, 6.58, 13.16, and 26.32 μg cm−2. For Cd at 0.75 μg cm−2, in the micronucleus test (detects chromosomal aberrations, significant increases (<.05 in micronuclei and binucleate cells were observed, and in the comet assay (detects DNA single-strand breaks, tail DNA% was significantly increased. Lead was less toxic with minimal effects on DNA, but the binucleates were significantly increased by Pb at 3.29 μg cm−2. This study shows that Cd is more acutely toxic and sublethally genotoxic than Pb to P. peguana. Cadmium caused chromosomal aberrations and DNA single-strand breaks at 45% of the LC10 concentration. Lead, in contrast, did not induce DNA damage but caused cytokinesis defects.

  17. Genotoxicity of formaldehyde: Molecular basis of DNA damage and mutation

    Directory of Open Access Journals (Sweden)

    Masanobu eKawanishi

    2014-09-01

    Full Text Available Formaldehyde is commonly used in the chemical industry and is present in the environment, such as vehicle emissions, some building materials, food and tobacco smoke. It also occurs as a natural product in most organisms, the sources of which include a number of metabolic processes. It causes various acute and chronic adverse effects in humans if they inhale its fumes. Among the chronic effects on human health, we summarize data on genotoxicity and carcinogenicity in this review, and we particularly focus on the molecular mechanisms involved in the formaldehyde mutagenesis. Formaldehyde mainly induces N-hydroxymethyl mono-adducts on guanine, adenine and cytosine, and N-methylene crosslinks between adjacent purines in DNA. These crosslinks are types of DNA damage potentially fatal for cell survival if they are not removed by the nucleotide excision repair pathway. In the previous studies, we showed evidence that formaldehyde causes intra-strand crosslinks between purines in DNA using a unique method (Matsuda et al. Nucleic Acids Res. 26, 1769-1774,1998. Using shuttle vector plasmids, we also showed that formaldehyde as well as acetaldehyde induces tandem base substitutions, mainly at 5’-GG and 5’-GA sequences, which would arise from the intra-strand crosslinks. These mutation features are different from those of other aldehydes such as crotonaldehyde, acrolein, glyoxal and methylglyoxal. These findings provide molecular clues to improve our understanding of the genotoxicity and carcinogenicity of formaldehyde.

  18. In vivo genotoxicity assessment of acrylamide and glycidyl methacrylate.

    Science.gov (United States)

    Dobrovolsky, Vasily N; Pacheco-Martinez, M Monserrat; McDaniel, L Patrice; Pearce, Mason G; Ding, Wei

    2016-01-01

    Acrylamide (ACR) and glycidyl methacrylate (GMA) are structurally related compounds used for making polymers with various properties. Both chemicals can be present in food either as a byproduct of processing or a constituent of packaging. We performed a comprehensive evaluation of ACR and GMA genotoxicity in Fisher 344 rats using repeated gavage administrations. Clastogenicity was measured by scoring micronucleated (MN) erythrocytes from peripheral blood, DNA damage in liver, bone marrow and kidneys was measured using the Comet assay, and gene mutation was measured using the red blood cell (RBC) and reticulocyte Pig-a assay. A limited histopathology evaluation was performed in order to determine levels of cytotoxicity. Doses of up to 20 mg/kg/day of ACR and up to 250 mg/kg/day of GMA were used. ACR treatment resulted in DNA damage in the liver, but not in the bone marrow. While ACR was not a clastogen, it was a weak (equivocal) mutagen in the cells of bone marrow. GMA caused DNA damage in the cells of bone marrow, liver and kidney, and induced MN reticulocytes and Pig-a mutant RBCs in a dose-dependent manner. Collectively, our data suggest that both compounds are in vivo genotoxins, but the genotoxicity of ACR is tissue specific. Published by Elsevier Ltd.

  19. Hexavalent chromium is cytotoxic and genotoxic to American alligator cells.

    Science.gov (United States)

    Wise, Sandra S; Wise, Catherine; Xie, Hong; Guillette, Louis J; Zhu, Cairong; Wise, John Pierce; Wise, John Pierce

    2016-02-01

    Metals are a common pollutant in the aquatic ecosystem. With global climate change, these levels are anticipated to rise as lower pH levels allow sediment bound metals to be released. The American alligator (Alligator mississippiensis) is an apex predator in the aquatic ecosystem and is considered a keystone species; as such it serves as a suitable monitor for localized pollution. One metal of increasing concern is hexavalent chromium (Cr(VI)). It is present in the aquatic environment and is a known human carcinogen and reproductive toxicant. We measured the cytotoxicity and genotoxicity of Cr(VI) in American alligator cells derived from scute tissue. We found that particulate and soluble Cr(VI) are both cytotoxic and genotoxic to alligator cells in a concentration-dependent manner. These data suggest that alligators may be used as a model for assessing the effects of environmental Cr(VI) contamination as well as for other metals of concern. Copyright © 2015 Elsevier B.V. All rights reserved.

  20. No genotoxicity of a new nickel-free stainless steel.

    Science.gov (United States)

    Montanaro, L; Cervellati, M; Campoccia, D; Prati, C; Breschi, L; Arciola, C R

    2005-01-01

    Stainless steel is a metallic alloy largely employed in orthopedics, maxillofacial surgery and orthodontic therapy. However, the presence in its composition of a high quantity of nickel, an agent known to trigger toxic, allergic and cancerogenous responses in humans, is cause of some concern. In this study, we have investigated the in vitro mutagenicity and genotoxicity of a new nickel-free stainless steel, namely P558, in comparison to the conventional stainless steel AISI 316L. The cytogenetic effects were evaluated by studying the frequency of Sister Chromatid Exchanges (SCE) and chromosomal aberrations. Ames test was performed to detect the mutagenic activity. Both P558 and AISI 316L did not cause any significant increase in the average number of SCE and in chromosomal aberrations, either with or without metabolic activation. Furthermore, the Ames test showed that the extracts of both P558 and of AISI 316L are not mutagenic. Overall, these findings prove that P558 is devoid of genotoxicity and mutagenicity. The present results, together with other previous interesting observations that P558 promotes osseointegration, suggest that this new nickel-free stainless steel can represent a better alternative to other conventional steel alloys.

  1. The genotoxicity and cytotoxicity assessments of andrographolide in vitro.

    Science.gov (United States)

    Sharifuddin, Yusrizam; Parry, Elizabeth M; Parry, James M

    2012-05-01

    Andrographolide is a major phytoconstituent present in Andrographis paniculata, a plant used in traditional medicines in Asia for various ailments. This tropical shrub was reported to possess various pharmacological activities and has been marketed around the world including Europe, however the toxicological data especially potential genotoxicity assessment on the phytocompound is still lacking. This study was performed to assess the ability of andrographolide to induce chromosomal changes using the in vitro cytokinesis-blocked micronucleus assay with immunofluorescent labelling of kinetochores in metabolically-competent AHH-1 and MCL-5 human lymphoblastoid cell lines. Various cytotoxicity endpoints were also evaluated in this study. Andrographolide was found to cause a weak increase in micronuclei induction at 10-50 μM in both AHH-1 and MCL-5 cell lines, respectively which were within the historical range. Kinetochore analysis revealed that the micronuclei induced in MCL-5 cells due to andrographolide exposure originated via an aneugenic mechanism that was indicated by the relatively higher but non-significant percentage of kinetochore positive micronuclei compared to negative control. Andrographolide also elicited a dose-dependent cellular cytotoxicity, with cells dying primarily via necrosis compared to apoptosis. Here we report that andrographolide was not genotoxic at the doses tested and it induces dose-dependent necrosis in vitro. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Antioxidant, genotoxic and antigenotoxic activities of daphne gnidium leaf extracts

    Directory of Open Access Journals (Sweden)

    Chaabane Fadwa

    2012-09-01

    Full Text Available Abstract Background Plants play a significant role in maintaining human health and improving the quality of human life. They serve humans well as valuable components of food, as well as in cosmetics, dyes, and medicines. In fact, many plant extracts prepared from plants have been shown to exert biological activity in vitro and in vivo. The present study explored antioxidant and antigenotoxic effects of Daphne gnidium leaf extracts. Methods The genotoxic potential of petroleum ether, chloroform, ethyl acetate, methanol and total oligomer flavonoid (TOF enriched extracts from leaves of Daphne gnidium, was assessed using Escherichia coli PQ37. Likewise, the antigenotoxicity of the same extracts was tested using the “SOS chromotest test”. Antioxidant activities were studied using non enzymatic and enzymatic method: NBT/Riboflavine and xantine oxidase. Results None of the different extracts produced a genotoxic effect, except TOF extract at the lowest tested dose. Our results showed that D. gnidium leaf extracts possess an antigenotoxic effect against the nitrofurantoin a mutagen of reference. Ethyl acetate and TOF extracts were the most effective in inhibiting xanthine oxidase activity. While, methanol extract was the most potent superoxide scavenger when tested with the NBT/Riboflavine assay. Conclusions The present study has demonstrated that D. gnidium leaf extract possess antioxidant and antigenotoxic effects. These activities could be ascribed to compounds like polyphenols and flavonoid. Further studies are required to isolate the active molecules.

  3. Cytotoxicity and genotoxicity property of hydroxyapatite-mullite eluates.

    Science.gov (United States)

    Kalmodia, Sushma; Sharma, Vyom; Pandey, Alok K; Dhawan, Alok; Basu, Bikramjit

    2011-02-01

    Long-term biomedical applications of implant materials may cause osteolysis, aseptic losing and toxicity. Therefore, we investigated the cytotoxic and genotoxic potential of hydroxyapatite (HA) mullite eluates in L929 mouse fibroblast cells. The spark plasma sintered HA-20% mullite biocomposite (HA20M) were ground using mortar and pestle as well as ball milling. The cells were exposed for 6 h to varying concentrations (10, 25, 50, 75 and 100%) of the eluates of HA-20% mullite (87 nm), HA (171 nm) and mullite (154 nm). The scanning electron microscopy and MTT assay revealed the concentration dependent toxicity of H20M eluate at and above 50%. The analysis of the DNA damaging potential of HA, mullite and HA20M eluates using Comet assay demonstrated a significant DNA damage by HA20M which was largely related to the presence of mullite. The results collectively demonstrate the cytotoxic and genotoxic potential of HA20M eluate in L929 cells is dependent on particle size, concentration and composition.

  4. Genotoxic effects of bismuth (III oxide nanoparticles by comet assay

    Directory of Open Access Journals (Sweden)

    Reecep Liman

    2015-06-01

    Full Text Available Bismuth oxide is one of the important transition metal oxides and it has been intensively studied due to their peculiar characteristics (semiconductor band gap, high refractive index, high dielectric permittivity, high oxygen conductivity, resistivity, photoconductivity and photoluminescence etc.. Therefore, it is used such as microelectronics, sensor technology, optical coatings, transparent ceramic glass manufacturing, nanoenergetic gas generator, biosensor for DNA hybridization, potential immobilizing platforms for glucose oxidase and polyphenol oxidase, fuel cells, a additive in paints, an astringent in a variety of medical creams and topical ointments, and for the determination of heavy metal ions in drinking water, mineral water and urine. In addition this, Bismuth (III oxide nanoparticles (BONPs are favorable for the biomolecules adsorption than regular sized particles because of their greater advantages and novel characteristics (much higher specific surface, greater surface free energy, and good electrochemical stability etc.. Genotoxic effects of BONPs were investigated on the root cells of Allium cepa by Comet assay. A. cepa roots were treated with the aqueous dispersions of BONPs at 5 different concentrations (12.5, 25, 50, 75, and 100 ppm for 4 h. A significant increase in DNA damage was also observed at all concentrations of BONPs except 12.5 ppm by Comet assay. The results were also analyzed statistically by using SPSS for Windows; Duncan’s multiple range test was performed. These result indicate that BONPs exhibit genotoxic activity in A. cepa root meristematic cells.

  5. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  6. DNA damage in caged Gammarus fossarum amphipods: A tool for freshwater genotoxicity assessment

    Energy Technology Data Exchange (ETDEWEB)

    Lacaze, Emilie [Universite de Lyon, INRA-ENTPE, Laboratoire des Sciences de l' Environnement, rue Maurice Audin, Vaulx en Velin F-69518 (France); Cemagref, Unite de Recherche des Milieux Aquatiques, (UR MALY), 3 bis quai Chauveau, 69336 Lyon, Cedex 9 (France); Devaux, Alain [Universite de Lyon, INRA-ENTPE, Laboratoire des Sciences de l' Environnement, rue Maurice Audin, Vaulx en Velin F-69518 (France); Mons, Raphael [Cemagref, Unite de Recherche des Milieux Aquatiques, (UR MALY), 3 bis quai Chauveau, 69336 Lyon, Cedex 9 (France); Bony, Sylvie [Universite de Lyon, INRA-ENTPE, Laboratoire des Sciences de l' Environnement, rue Maurice Audin, Vaulx en Velin F-69518 (France); Garric, Jeanne [Cemagref, Unite de Recherche des Milieux Aquatiques, (UR MALY), 3 bis quai Chauveau, 69336 Lyon, Cedex 9 (France); Geffard, Alain [EA 2069 URVVC-SE, Laboratoire d' Eco-Toxicologie, UFR Sciences, Moulin de la Housse, BP 1039, 51687 Reims Cedex 2 (France); Geffard, Olivier, E-mail: olivier.geffard@cemagref.fr [Cemagref, Unite de Recherche des Milieux Aquatiques, (UR MALY), 3 bis quai Chauveau, 69336 Lyon, Cedex 9 (France)

    2011-06-15

    The aim of this study was to propose a tool for freshwater environmental genotoxicity assessment using Gammarus fossarum, a high ecologically relevant species. In a first part, gammarids were caged upstream and downstream wastewater treatment plant effluent output. The sensitivity of genotoxic responses of haemocytes, oocytes and spermatozoa was compared using the Comet assay. Spermatozoa appeared to be the most sensitive, suitable and relevant cell type for genotoxicity risk assessment. In a second part, a watershed-scale study was conducted over 2 years to evaluate the applicability of our caging procedure. The genotoxic impact of a contamination was followed, taking into account seasonal variability. DNA damage in spermatozoa exhibited low basal level and low variability in control upstream sites, providing a reliable discrimination of polluted sites. Finally, DNA damage in caged G. fossarum has been proved to be a sensitive and reproducible tool for freshwater genotoxicity assessment. - Highlights: > Two different contamination contexts: WWTP effluents and polymetallic contamination. > DNA damage in caged Gammarus fossarum is a sensitive tool for freshwater quality assessment. > Spermatozoa is the most relevant cell type for biomonitoring freshwater genotoxicity. > Combining biomarker responses with analytical chemistry provides rich ecotoxicological information. - We propose an approach to assess freshwater genotoxicity in the field based on caged Gammarus fossarum (Crustacea, amphipoda).

  7. New investigations into the genotoxicity of cobalt compounds and their impact on overall assessment of genotoxic risk.

    Science.gov (United States)

    Kirkland, David; Brock, Tom; Haddouk, Hasnaà; Hargeaves, Victoria; Lloyd, Melvyn; Mc Garry, Sarah; Proudlock, Raymond; Sarlang, Séverine; Sewald, Katherina; Sire, Guillaume; Sokolowski, Andrea; Ziemann, Christina

    2015-10-01

    The genotoxicity of cobalt metal and cobalt compounds has been widely studied. Several publications show induction of chromosomal aberrations, micronuclei or DNA damage in mammalian cells in vitro in the absence of S9. Mixed results were seen in gene mutation studies in bacteria and mammalian cells in vitro, and in chromosomal aberration or micronucleus assays in vivo. To resolve these inconsistencies, new studies were performed with soluble and poorly soluble cobalt compounds according to OECD-recommended protocols. Induction of chromosomal damage was confirmed in vitro, but data suggest this may be due to oxidative stress. No biologically significant mutagenic responses were obtained in bacteria, Tk(+/-) or Hprt mutation tests. Negative results were also obtained for chromosomal aberrations (in bone marrow and spermatogonia) and micronuclei at maximum tolerated doses in vivo. Poorly soluble cobalt compounds do not appear to be genotoxic. Soluble compounds do induce some DNA and chromosomal damage in vitro, probably due to reactive oxygen. The absence of chromosome damage in robust GLP studies in vivo suggests that effective protective processes are sufficient to prevent oxidative DNA damage in whole mammals. Overall, there is no evidence of genetic toxicity with relevance for humans of cobalt substances and cobalt metal. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  8. Know the Warning Signs of a Heart Attack

    Science.gov (United States)

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  9. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  10. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  12. Crisis-induced depression, physical activity and dietary intake among young adults: evidence from the 9/11 terrorist attacks.

    Science.gov (United States)

    Wang, Yang; Yang, Muzhe

    2013-03-01

    Using data from the National Longitudinal Study of Adolescent Health, we provide evidence that young adults respond to crisis-induced depression by exercising less and having breakfast less often. Exogenous variation in the crisis-induced depression is obtained through a unique event in our sample period - the 9/11 terrorist attacks. We compare those who were interviewed just before and just after 9/11 and find a significant and sharp increase in the symptoms of depression. We also provide evidence that this increase is not a September effect, but an effect of the external traumatic event. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  14. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  15. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps,

  16. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  17. Evaluation of the tickcide, genotoxic, and mutagenic effects of the Ruta graveolens L. (Rutaceae

    Directory of Open Access Journals (Sweden)

    Alessandra Vargas de Carvalho

    2015-10-01

    Full Text Available Current analysis investigated the tickcide effects of the aqueous extract and chloroform fractions of Ruta graveolens L. (rue on engorged females of Rhipicephalus microplus, as well as their genotoxic and mutagenic effects on human leukocytes. The best tickcide activity (non-dependent dose and genotoxic / mutagenic effects (dependent-dose were observed on exposure to chloroform fractions. Results suggest that extract fractions of R. graveolens L are efficient against R. microplus, although the fraction and the tested concentrations show genotoxic and mutagenic potential for human leukocytes.

  18. Acute Toxicity and Genotoxic Activity of Avocado Seed Extract (Persea americana Mill., c.v. Hass

    Directory of Open Access Journals (Sweden)

    Eduardo Padilla-Camberos

    2013-01-01

    Full Text Available The use of vegetal extracts requires toxicological and genotoxic evaluations to establish and verify safety before being added to human cosmetic, pharmaceutical medicine, or alimentary products. Persea americana seeds have been used in traditional medicine as treatment for several diseases. In this work, the ethanolic seed extract of Persea americana was evaluated with respect to its genotoxic potential through micronucleus assay in rodents. The frequency of micronuclei in groups of animals treated with avocado seed extract showed no differences compared to the negative control (vehicle; therefore, it is considered that the avocado seed extract showed no genotoxic activity in the micronucleus test.

  19. Acute Toxicity and Genotoxic Activity of Avocado Seed Extract (Persea americana Mill., c.v. Hass)

    Science.gov (United States)

    Padilla-Camberos, Eduardo; Martínez-Velázquez, Moisés; Flores-Fernández, José Miguel; Villanueva-Rodríguez, Socorro

    2013-01-01

    The use of vegetal extracts requires toxicological and genotoxic evaluations to establish and verify safety before being added to human cosmetic, pharmaceutical medicine, or alimentary products. Persea americana seeds have been used in traditional medicine as treatment for several diseases. In this work, the ethanolic seed extract of Persea americana was evaluated with respect to its genotoxic potential through micronucleus assay in rodents. The frequency of micronuclei in groups of animals treated with avocado seed extract showed no differences compared to the negative control (vehicle); therefore, it is considered that the avocado seed extract showed no genotoxic activity in the micronucleus test. PMID:24298206

  20. Treatment with exogenous surfactant stimulates endogenous surfactant synthesis in premature infants with respiratory distress syndrome

    NARCIS (Netherlands)

    Bunt, JEH; Carnielli, VP; Janssen, DJ; Wattimena, JLD; Hop, WC; Sauer, PJ; Zimmermann, LJI

    2000-01-01

    Objective: Treatment of preterm infants with respiratory distress syndrome (RDS) with exogenous surfactant has greatly improved clinical outcome. Some infants require multiple doses, and it has not been studied whether these large amounts of exogenous surfactant disturb endogenous surfactant

  1. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  2. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  3. Long-lived radicals (LLR) which cause genotoxic effects

    International Nuclear Information System (INIS)

    Watanabe, M.; Kodama, S.; Suzuki, K.; Kumagai, J.; Miyazaki, T.

    2003-01-01

    Many researcher studying in area of radiation biology believed that active short life-time radicals such as OH and H radicals, play an important role to express genotoxic effects of radiations in cells, such as mutation and transformation induction. However, in 1993 we found a new type of radicals with long life-time in gamma- or X- irradiated golden hamster embryo (GHE) cells (T1/2>20hr) at room temperature by using electron spin resonance (ESR) spectroscopy . It may be more important in mutation induction rather than the active short-live radicals. When Vitamin C (AsA) is added to the gamma- or X- irradiated cells at 20 min or 6 hr after the irradiation, respectively, LLR are scavenged by it simultaneously with the drastic suppression of genotoxicity such as mutation and transformation. Since reactive oxygen species (ROS) disappear within microsecond after the irradiation, AsA do not scavenge the ROS but LLR. Therefore, we have proposed that LLR must be responsible radicals for inducing mutation, and probably important for the genotoxicity in the irradiated mammalian cells. Addition of AsA to the cells before or after irradiation does not have any effects on reducing cell death and chromosomal aberration. For these ten years, we have pointed out the importance of LLR, rather than short life-time radicals, produced in gamma- or X-ray irradiated mammalian cells which can induce mutation in the irradiated mammalian cells. By the studies using Electron Spin Echo Envelope Modulation (ESEEM) spectroscopy, we found that LLR probably locate in interior of biopolymers where few water molecules exist. By further analysis of the ESR spectra of LLR and comparison of the yields of radicals in proteins and DNA, we reached to the conclusion that LLR are produced in protein and assigned as sulfinyl radicals as oxidized cysteine groups. LLR are not produced in DNA or in lipids. Our result show that the LLR produced in protein is responsible for the gene mutation in irradiated

  4. On the fate of exogenously supplied bacterial DNA in soybean

    International Nuclear Information System (INIS)

    Luyindula Ndiku

    1980-01-01

    The fate of exogenously supplied radiolabelled DNA from agrobacterium tumefaciens and micrococcus lysodeikticus was investigated in soybean tissues growing under various physiological conditions. The following observations are made: a) Rapid degradation and reutilization of the donor DNA was observed in callus tissue culture. b) Germinating seeds and five-day old seedlings were shown to degrade DNA in the incubation medium and to ultilize these degradation products for their own DNA synthesis. Reutilization could be almost totally suppressed the addition of unlabelled thymidine as a competitor. This allowed a detection of significant amounts of residuel donor closely but transiently associated with the plant tissues. c) In soybean shoots dipped into a solution of donor DNA, partly this DNA was found to first migrate to the leaves where mostly labelled endogenous DNA was later found. Very large amounts of polymerized exogenous DNA were found in the regenerated roots after 12 days of culture. (author)

  5. Exogenous melatonin improves Malus resistance to Marssonina apple blotch.

    Science.gov (United States)

    Yin, Lihua; Wang, Ping; Li, Mingjun; Ke, Xiwang; Li, Cuiying; Liang, Dong; Wu, Shan; Ma, Xinli; Li, Chao; Zou, Yangjun; Ma, Fengwang

    2013-05-01

    We examined whether exogenously applied melatonin could improve resistance to Marssonina apple blotch (Diplocarpon mali) by apple [Malus prunifolia (Willd.) Borkh. cv. Donghongguo]. This serious disease leads to premature defoliation in the main regions of apple production. When plants were pretreated with melatonin, resistance was increased in the leaves. We investigated the potential roles for melatonin in modulating levels of hydrogen peroxide (H2O2), as well the activities of antioxidant enzymes and pathogenesis-related proteins during these plant-pathogen interactions. Pretreatment enabled plants to maintain intracellular H2O2 concentrations at steady-state levels and enhance the activities of plant defence-related enzymes, possibly improving disease resistance. Because melatonin is safe and beneficial to animals and humans, exogenous pretreatment might represent a promising cultivation strategy to protect plants against this pathogen infection. © 2012 John Wiley & Sons A/S. Published by Blackwell Publishing Ltd.

  6. Analyzing Bullwhip Effect in Supply Networks under Exogenous Uncertainty

    Directory of Open Access Journals (Sweden)

    Mitra Darvish

    2014-05-01

    Full Text Available This paper explains a model for analyzing and measuring the propagation of order amplifications (i.e. bullwhip effect for a single-product supply network topology considering exogenous uncertainty and linear and time-invariant inventory management policies for network entities. The stream of orders placed by each entity of the network is characterized assuming customer demand is ergodic. In fact, we propose an exact formula in order to measure the bullwhip effect in the addressed supply network topology considering the system in Markovian chain framework and presenting a matrix of network member relationships and relevant order sequences. The formula turns out using a mathematical method called frequency domain analysis. The major contribution of this paper is analyzing the bullwhip effect considering exogenous uncertainty in supply networks and using the Fourier transform in order to simplify the relevant calculations. We present a number of numerical examples to assess the analytical results accuracy in quantifying the bullwhip effect.

  7. Theory of endogenous and exogenous motivation in L2 migration

    Directory of Open Access Journals (Sweden)

    Kambon, Obadele Bakari

    2015-09-01

    Full Text Available Implied in theories of Second Language Acquisition (SLA is the notion that language learning is analogous to obtaining or acquiring a possession – thus the use of the term ‘acquisition.’ While this interpretation has gone relatively unchallenged in the literature, this article introduces a new analogy whereby language learning is seen as analogous to a process of permanent or semi-permanent migration towards a new socio-linguistic L2 space. As such, a theory of endogenous and exogenous motivation is delineated, entailing a dynamic interplay between internal (primarily psychological and external (primarily sociological push-pull factors. Endogenous and exogenous push-pull factors, together with various other personal factors, contribute to learner decisions to migrate towards, move away from or remain inert with regard to the target language. Further, motivation is framed in the larger theoretical context of causation.

  8. Differentiation of stem cells upon deprivation of exogenous FGF2

    DEFF Research Database (Denmark)

    Kjartansdóttir, Kristín Rós; Gabrielsen, Anette; Reda, Ahmed

    2012-01-01

    Establishing a model for in vitro differentiation of human embryonic stem cells (hESCs) towards the germ cell lineage could be used to identify molecular mechanisms behind germ cell differentiation that may help in understanding human infertility. Here, we evaluate whether a lack of exogenous...... fibroblast growth factor 2 (FGF2) is supporting spontaneous differentiation of hESCs cultured on human foreskin fibroblast (hFF) monolayers towards germ cell lineage. Additionally to depriving the hESCs of exogenous FGF2, cells were stimulated with all-trans retinoic acid (ATRA). To get a more comprehensive...... impression on effects of removal of FGF2 and stimulation with ATRA, we combined the results of three cell lines for each experimental setting. When combining gene expression profiles of three cell lines for 96 genes, only 6 genes showed a significant up-regulation in all cell lines, when no FGF2 was added...

  9. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  10. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    Heller, W.

    2004-01-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  11. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  12. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  13. Speculative prototypes and exogenous ethnographies: Experiencing relationships beyond the human

    DEFF Research Database (Denmark)

    Jönsson, Li; Ulv Lenskjold, Tau

    2017-01-01

    This article deals with the role that speculative design prototypes have as means to intervene in contexts of everyday life in order to explore, and possibly facilitate, new types of relationships between human and non-human beings. Focusing on an off-centered design of the human, it seeks to exp...... to explore what types of new possibilities may arise when speculation in design meets the practice of doing what might be termed an "exogenous ethnography"....

  14. Tenacity of exogenous human papillomavirus DNA in sperm washing.

    Science.gov (United States)

    Brossfield, J E; Chan, P J; Patton, W C; King, A

    1999-07-01

    Sperm cells have been shown to take up exogenous DNA readily. The hypothesis was that sperm washing would remove exogenous viral DNA infecting sperm cells. The objective was to compare three types of sperm washing procedures for their capacity to remove exogenous human papillomavirus (HPV) DNA from infected sperm. Prewashed sperm were equally divided and sperm in one portion were exposed to L1 HPV DNA fragments for 30 min at 37 degrees C. Untreated washed sperm served as the control. After transfection, the sperm were washed by either centrifuge, two-layer Isolate colloid wash, or test-yolk buffer procedures. Sperm parameters were measured on a Hamilton Thorn HTM-C analyzer. Sperm DNA were extracted and polymerase chain reaction (PCR) was carried out targeting the L1 consensus gene of HPV and the designated sentinel gene, 17q21 spanning the D17S855 gene. Amplified products were analyzed in 2% agarose gel electrophoresis. PCR analyses detected the consensus L1 HPV gene in sperm after they were processed through either of the three procedures. Controls were negative for the L1 gene. Extracted DNA were verified by PCR amplification of 17q21 spanning the D17S855 gene. Transfected sperm had higher percentages of total motility and progression compared with the control. Centrifuged, washed, transfected sperm exhibited a greater curvilinear velocity and hyperactivation. The data showed that washing would not remove exogenous HPV DNA from sperm cells. The viral DNA was tenaciously bound to the sperm, suggesting an internalization into the sperm. The viral DNA also increased the motility of the sperm by affecting the velocity and progression of the sperm, which suggested either an increase in metabolism, an enhancement of the calcium-regulated motility mechanism, or an artifact of PCR reagents. More studies are needed to elucidate the mechanism of DNA stimulated sperm motility.

  15. Managers with and without Style: Evidence Using Exogenous Variation

    OpenAIRE

    C. Edward Fee; Charles J. Hadlock; Joshua R. Pierce

    2013-01-01

    In a large panel of Compustat firms, we find that firm policy changes after exogenous CEO departures do not display abnormally high levels of variability, casting doubt on the presence of idiosyncratic-style effects in policy choices. After endogenous CEO departures, we do detect abnormally large policy changes. These changes are larger when the firm is likely to draw from a deeper pool of replacement CEO candidates, suggesting the presence of causal-style effects that are anticipated by the ...

  16. Computational analysis for biodegradation of exogenously depolymerizable polymer

    Science.gov (United States)

    Watanabe, M.; Kawai, F.

    2018-03-01

    This study shows that microbial growth and decay in a biodegradation process of exogenously depolymerizable polymer are controlled by consumption of monomer units. Experimental outcomes for residual polymer were incorporated in inverse analysis for a degradation rate. The Gauss-Newton method was applied to an inverse problem for two parameter values associated with the microbial population. A biodegradation process of polyethylene glycol was analyzed numerically, and numerical outcomes were obtained.

  17. Exogenous glucocorticoids and adverse cerebral effects in children.

    Science.gov (United States)

    Damsted, Sara K; Born, A P; Paulson, Olaf B; Uldall, Peter

    2011-11-01

    Glucocorticoids are commonly used in treatment of paediatric diseases, but evidence of associated adverse cerebral effects is accumulating. The various pharmacokinetic profiles of the exogenous glucocorticoids and the changes in pharmacodynamics during childhood, result in different exposure of nervous tissue to exogenous glucocorticoids. Glucocorticoids activate two types of intracellular receptors, the mineralocorticoid receptor and the glucocorticoid receptor. The two receptors differ in cerebral distribution, affinity and effects. Exogenous glucocorticoids favor activation of the glucocorticoid receptor, which is associated with unfavorable cellular outcomes. Prenatal treatment with glucocorticoids can compromise brain growth and is associated with periventricular leukomalacia, attentions deficits and poorer cognitive performance. In the neonatal period exposure to glucocorticoids reduces neurogenesis and cerebral volume, impairs memory and increases the incidence of cerebral palsy. Cerebral effects of glucocorticoids in later childhood have been less thoroughly studied, but apparent brain atrophy, reduced size of limbic structures and neuropsychiatric symptoms have been reported. Glucocortioids affect several cellular structures and functions, which may explain the observed adverse effects. Glucocorticoids can impair neuronal glucose uptake, decrease excitability, cause atrophy of dendrites, compromise development of myelin-producing oligodendrocytes and disturb important cellular structures involved in axonal transport, long-term potentiation and neuronal plasticity. Significant maturation of the brain continues throughout childhood and we hypothesize that exposure to exogenous glucocorticoids during preschool and school age causes adverse cerebral effects. It is our opinion that studies of associations between exposure to glucocorticoids during childhood and impaired neurodevelopment are highly relevant. Copyright © 2011 European Paediatric Neurology

  18. Exogenous lipoid pneumonia: high-resolution CT findings

    International Nuclear Information System (INIS)

    Lee, J.S.; Song, K.S.; Lim, T.H.; Im, J.G.; Seo, J.B.

    1999-01-01

    The aim of this study was to assess high-resolution computed tomography (HRCT) findings of exogenous lipoid pneumonia. High-resolution computed tomography was obtained in 25 patients with proven exogenous lipoid pneumonia resulting from aspiration of squalene (derived from shark liver oil). Diagnosis was based on biopsy (n = 9), bronchoalveolar lavage (n = 8), or sputum cytology and clinical findings (n = 8). The clinical history of taking squalene was confirmed in all patients. The CT findings were classified into three patterns: diffuse ground-glass opacity, consolidation, and interstitial abnormalities. Distribution of the abnormalities, duration of taking squalene, predisposing factors for aspiration, and route of administration were analyzed. Ten patients showed diffuse ground-glass opacity pattern. Seven of 10 patients had predisposing conditions such as unconsciousness, pharyngeal dysmotility, or motor disturbances, and 6 patients had a recent history of taking large amount of squalene through nasal route. Seven patients who had consolidation pattern had a history of taking squalene for several months and did not have any predisposing factor. All of the 5 patients who had a pattern of interstitial abnormalities had a history of taking squalene longer than 1 year and showed segmental distribution of interstitial thickening with interposing ground-glass opacities. Three patients simultaneously had two different patterns at different lobes of the lung. The HRCT findings of lipoid pneumonia are ground-glass opacities, consolidation, and interstitial abnormalities. These HRCT findings with appropriate inquiries could be useful for diagnosis of exogeneous lipoid pneumonia. (orig.)

  19. [Exogenous Sr2+ sedimentation on otolith of chum salmon embryos].

    Science.gov (United States)

    Wang, Chen; Liu, Wei; Zhan, Pei-rong; Wang, Ji-long; Li, Pei-lun

    2015-10-01

    To explore the exogenous Sr2+ sedimentation on otolith of chum salmon embryos, chum salmon embryos were exposed to culture water contained Sr2+ at Sr2+ concentration of 50, 100, 200 or 400 mg . L-1 for 48 h to imitate Sr2+ sedimentation. After a culturing period of 12 d and 100 d, the otoliths of the chum salmon were taken to detect exogenous Sr2+ sedimentation with electro-probe microanalyzer (EPMA). The results showed that obvious deep red strontium signatures were produced in the otolith of chum salmon at different concentrations of Sr2+. The mean and extreme values of peak strontium area were not stable for the same Sr2+ dose, but the lowest of all the peak values was 35.1 times as much as that of control. Overall, the strontium value increased with the increase of Sr2+concentration. The strontium peak had no signs of abating after a culture period of 100 d. The results also showed that strontium was gradually deposited in the otolith, and had obvious hysteresis to immersion. Strontium sedimentation could also return to a normal level after the peak. These characteristics accorded exactly with the requirement of discharge tag technology, which indicated that exogenous Sr2+ was suitable in the marking of salmon otolith.

  20. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  1. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  2. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  3. Function of endothelium at adolescents with constitutional exogenous obesity before and after rehabilitation

    OpenAIRE

    Miroshnichenko, O.

    2011-01-01

    Function of endothelium at 43 adolescents with constitutional exogenous obesity before rehabilitation and at 33 healthy adolescents has been studied. Disorder of endothelial function has been established in 32 (74.4%) adolescents with constitutional exogenous obesity and in 7 (21.2%) healthy adolescents. We showed the efficiency of the rehabilitation program on restoration of endothelial function at adolescents with constitutional exogenous obesity.

  4. Static magnetic field reduced exogenous oligonucleotide uptake by spermatozoa using magnetic nanoparticle gene delivery system

    Energy Technology Data Exchange (ETDEWEB)

    Katebi, Samira; Esmaeili, Abolghasem, E-mail: aesmaeili@sci.ui.ac.ir; Ghaedi, Kamran

    2016-03-15

    Spermatozoa could introduce exogenous oligonucleotides of interest to the oocyte. The most important reason of low efficiency of sperm mediated gene transfer (SMGT) is low uptake of exogenous DNA by spermatozoa. The aim of this study was to evaluate the effects of static magnetic field on exogenous oligonucleotide uptake of spermatozoa using magnetofection method. Magnetic nanoparticles (MNPs) associated with the labeled oligonucleotides were used to increase the efficiency of exogenous oligonucleotide uptake by rooster spermatozoa. We used high-field/high-gradient magnet (NdFeB) to enhance and accelerate exogenous DNA sedimentation at the spermatozoa surface. Flow cytometry analysis was performed to measure viability and percentage of exogenous oligonucleotide uptake by sperm. Flow cytometry analysis showed a significant increase in exogenous oligonucleotide uptake by rooster spermatozoa (P<0.001) when spermatozoa were incubated in exogenous oligonucleotide solution and MNPs. However, by applying static magnetic field during magnetofection method, a significant decrease in exogenous oligonucleotide uptake was observed (P<0.05). Findings of this study showed that MNPs were effective to increase exogenous oligonucleotide uptake by rooster spermatozoa; however unlike others studies, static magnetic field, was not only ineffective to enhance exogenous oligonucleotide uptake by rooster spermatozoa but also led to reduction in efficiency of magnetic nanoparticles in gene transfer. - Highlights: • Core/shell type Iron oxide nanoparticles were used as a novel and efficient method. • This method increases exogenous DNA uptake by rooster spermatozoa. • Static magnetic field decreased DNA uptake by rooster spermatozoa.

  5. Effects of chemical agent injections on genotoxicity of wastewater in a microfiltration-reverse osmosis membrane process for wastewater reuse.

    Science.gov (United States)

    Tang, Fang; Hu, Hong-Ying; Wu, Qian-Yuan; Tang, Xin; Sun, Ying-Xue; Shi, Xiao-Lei; Huang, Jing-Jing

    2013-09-15

    With combined microfiltration (MF)/ultrafiltration (UF) and reverse osmosis (RO) process being widely used in municipal wastewater reclamation, RO concentrate with high level genotoxicity is becoming a potential risk to water environment. In this study, wastewater genotoxicity in a MF-RO process for municipal wastewater reclamation and also the effects of chemical agent injections were evaluated by SOS/umu genotoxicity test. The genotoxicity of RO concentrate ranged 500-559 μg 4-NQO (4-nitroquinoline-1-oxide)/L and 12-22 μg 4-NQO/mg DOC, was much higher than that of RO influent. Further research suggested that Kathon biocide was a key chemical agent associated with the genotoxicity increase. Kathon biocide used in RO system was highly genotoxic in vitro and Kathon biocide retained in RO system could contribute to a higher genotoxicity of RO concentrate. Hence, treatments for biocides before discharging are necessary. Chlorination of secondary effluent could significantly decrease the genotoxicity and increasing chlorine dosage could be an efficacious method to decrease the genotoxicity of RO concentrate. According to the result of the experiment, the dosage of chlorine in dual-membrane process could be set to about 2.5 mg Cl₂/L. The effect of antiscalant (2-phosphomobutane-1,2,4-tricarboxylic acid) was also investigated; it turned out to have no effect on genotoxicity. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Genotoxic Biomarkers in Erythrocytes of Lepidochelys olivacea (Cheloniidae from Colombia

    Directory of Open Access Journals (Sweden)

    Victor Hugo Quiroz Herrera

    2017-09-01

    Full Text Available This research was conducted in the municipality of Bahia Solano, Colombia, and had as a goal to detect damage erythrocytes circulating with nuclear lesions in fifty-five Olive Ridley adult females using acridine orange immunostain, and correlate its frequencies with some physiological and biometric parameters. We determine a micronucleated erythrocytes (MNE frequency of 0.6 ± 0.6 and nuclear buds (NBE of 2.1 ± 1.9. We not found any relationship between the nuclear lesions with physiological or biometric parameters evaluated (Pearson and Kruskal-Wallis, p<0.05. We define a significative statistical difference (p=0.035 between both nuclear lesions frequencies. This results show nuclear damages in erythrocytes of Olive Ridley sea turtle for the first time in Colombia as an outcome of genotoxic stress. Also contributes key information for future research in the ecotoxicology area for endangered marine species.

  7. The potential for new methods to assess human reproductive genotoxicity

    International Nuclear Information System (INIS)

    Mendelsohn, M.L.

    1987-09-01

    The immediate prospects are not good for practical methods for measuring the human heritable mutation rate. The methods discussed here range from speculative to impractical, and at best are sensitive enough only for large numbers of subjects. Given the rapid development of DNA methods and the current status of two-dimensional gel electrophoresis, there is some hope that the intermediate prospects may be better. In contrast, the prospects for useful cellular-based male germinal methods seem more promising and immediate. Effective specific locus methods for sperm are already conceivable and may be practical in a few years. Obviously such methods will not predict heritable effects definitively, but they will provide direct information on reproductive genotoxicity and should contribute significantly to many current medical and environmental situations where genetic damage is suspected. 22 refs

  8. Effects of wood dust:Inflammation, Genotoxicity and Cancer

    DEFF Research Database (Denmark)

    Lange, Jette Bornholdt

    of wood dust and endpoints for inflammation and genotoxicity was evaluated. The experiments showed that the different species of wood dust vary in their ability to cause DNA strand breaks and inflammation. There was no apparent correlation between the species potential to initiate inflammation...... cell line A549 measuring inflammatory and DNA damaging effects. The second part consists of a molecular analysis of the K-ras gene for mutations in the hotspots codons in human sinonasal cancers. Design, calibration and validation of the assays were performed. Cancer at the sinonasal cavities is rare......-malignant symptoms are still poorly understood. Particulate induced inflammation as well as extractives are suggested to be involved in the carcinogenesis. In this thesis wood dust potential to induce DNA damage and inflammation was investigated exposing the human lung epithelial cell line A549 to various species...

  9. Genotoxic potential of leaf extracts of Jatropha gossypiifolia L.

    Science.gov (United States)

    Almeida, P M; Araújo, S S; Santos, I R M R; Marin-Morales, M A; Benko-Iseppon, A M; Santos, A V; Randau, K P; Brasileiro-Vidal, A C

    2016-02-05

    Jatropha gossypiifolia L. (Euphorbiaceae) is widely used in popular medicine. However, further toxicological studies are necessary for its reliable use. The present study aimed to evaluate the cytotoxic, genotoxic, and mutagenic effects of ethanolic and aqueous leaf extracts of J. gossypiifolia, using the test system Allium cepa. In addition, the phytochemical profile of the extracts was also obtained. Seeds of A. cepa were subjected to different concentrations of the two extracts (0.001, 0.01, 0.1, 1, and 10 mg/mL). Distilled water was used for the negative control and methyl methanesulfonate (4 x 10(-4) M) and trifluralin (0.84 ppm) for the positive controls. The values of mitotic index at all concentrations of ethanolic extract and at 0.1, 1, and 10 mg/mL aqueous extract showed a significant decrease. Alterations, such as chromosome adherence, C-metaphases, chromosome bridges, nuclear buds, and micronuclei were verified in both extracts but chromosome loss indicating genotoxic activity was observed only in the ethanolic extract. Presence of micronuclei on administration of the extracts, also indicated mutagenic action at the chromosome level. In the ethanolic extract, aneugenicity seemed to be the main activity, probably as a result of the action of terpenes and/or flavonoids, whereas in the aqueous extract, clastogenic action appeared to be the principal activity, presumably as a consequence of the effect of flavonoids and/or saponins. Thus, we suggest that the extracts of this species should be used with great caution for medicinal purpose.

  10. Genotoxic effect of Phenanthrene on Chironomus sancticaroli (Diptera: Chironomidae

    Directory of Open Access Journals (Sweden)

    Gisele dos Santos Morais

    2014-08-01

    Full Text Available Phenanthrene, a Polycyclic Aromatic Hydrocarbon, remains adsorbed to sedimentary particles in aquatic environments. It affects mainly benthic organisms, and is considered potentially genotoxic. In ecotoxicology, species of Chironomus Meigen, 1803 are widely known as bioindicators of the effects of chemicals on aquatic organisms. This study investigates the effects of phenanthrene on the size of the head capsule of Chironomus sancticaroli Strixino & Strixino, 1981 larvae after chronic (eight days exposure, and DNA damage after acute (96 hours and chronic exposure (eight days, under laboratory conditions. DNA damage, evaluated using the alkaline comet assay, detected effects for both exposure periods, indicating that phenanthrene is toxic for C. sancticaroli. For the acute exposure, we analyzed five concentrations of phenanthrene, between 0.16 mg.l-1 and 1.60 mg.l-1, detecting significant differences (Kruskall-Wallis test with p < 0.05 in the degree of DNA damage in all groups. These effects were not dose-dependent. For the chronic exposure, two concentrations (0.16 mg.l-1, 0.83 mg.l-1 were analyzed, and DNA damage was observed in both. Again, the effects were not dose-dependent. This indicates that phenanthrene is genotoxic to larvae of C. sancticaroli even at low concentrations. The size of the head capsule was evaluated after chronic exposure to concentrations of 0.16 mg.l-1 and 0.83 mg.l-1. Significant differences (ANOVA test with p < 0.05 were detected in the two concentrations, and a reduction in the size of the larval head capsule was observed. This suggests that phenanthrene causes delay in larval development. These results indicate that phenanthrene affects the development of and causes DNA damage in C. sancticaroli larvae. Therefore, we suggest that C. sancticaroli can be used as a biological indicator for environmental contamination with phenanthrene.

  11. Pb low doses induced genotoxicity in Lactuca sativa plants.

    Science.gov (United States)

    Silva, S; Silva, P; Oliveira, H; Gaivão, I; Matos, M; Pinto-Carnide, O; Santos, C

    2017-03-01

    Soil and water contamination by lead (Pb) remains a topic of great concern, particularly regarding crop production. The admissible Pb values in irrigation water in several countries range from ≈0.1 to ≈5 mg L -1 . In order to evaluate putative effects of Pb within legal doses on crops growth, we exposed Lactuca sativa seeds and seedlings to increasing doses of Pb(NO 3 ) 2 up to 20 mg L -1 . The OECD parameter seed germination and seedling/plant growth were not affected by any of the Pb-concentrations used. However, for doses higher than 5 mg L -1 significant DNA damage was detected: Comet assay detected DNA fragmentation at ≥ 5 mg L -1 and presence of micronuclei (MN) were detected for 20 mg L -1 . Also, cell cycle impairment was observed for doses as low as 0.05 mg L -1 and 0.5 mg L -1 (mostly G 2 arrest). Our data show that for the low doses of Pb used, the OECD endpoints were not able to detect toxicity, while more sensitive endpoints (related with DNA damage and mitotic/interphase disorders) identified genotoxic and cytostatic effects. Furthermore, the nature of the genotoxic effect was dependent on the concentration. Finally, we recommend that MN test and the comet assay should be included as sensitive endpoints in (eco)toxicological assays. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  12. Cytotoxicity and genotoxicity of urban particulate matter in mammalian cells.

    Science.gov (United States)

    Dumax-Vorzet, Audrey F; Tate, M; Walmsley, Richard; Elder, Rhod H; Povey, Andrew C

    2015-09-01

    Ambient air particulate matter (PM)-associated reactive oxygen species (ROS) have been linked to a variety of altered cellular outcomes. In this study, three different PM samples from diesel exhaust particles (DEPs), urban dust standard reference material SRM1649a and air collected in Manchester have been tested for their ability to oxidise DNA in a cell-free assay, to increase intracellular ROS levels and to induce CYP1A1 gene expression in mammalian cells. In addition, the cytotoxicity and genotoxicity of PM were assessed using the 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay and alkaline comet assay, respectively. All PM samples catalysed the Fenton reaction in a cell-free assay, but only DEP resulted in the generation of ROS as measured by dichlorodihydrofluorescein diacetate oxidation in mammalian cells. However, there was no evidence that increased ROS was a consequence of polycyclic aromatic hydrocarbon metabolism via CYP1A1 induction as urban dust, the Manchester dust samples but not DEP-induced CYP1A1 expression. Urban dust was more cytotoxic in murine embryonic fibroblasts (MEFs) than the other PM samples and also induced expression of GADD45a in the GreenScreen Human Cell assay without S9 activation suggesting the presence of a direct-acting genotoxicant. Urban dust and DEP produced comparable levels of DNA damage, as assessed by the alkaline comet assay, in MEFs at higher levels than those induced by Manchester PM. In conclusion, results from the cytotoxic and genotoxic assays are not consistent with ROS production being the sole determinant of PM-induced toxicity. This suggests that the organic component can contribute significantly to this toxicity and that further work is required to better characterise the extent to which ROS and organic components contribute to PM-induced toxicity. © The Author 2015. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society.

  13. The influence of abiotic factors present in the Rio de la Plata over the chromium genotoxicity

    International Nuclear Information System (INIS)

    Lopez, L.C.; Moretton, J.

    1997-01-01

    The alterations suffered by the well-known environmental genotoxic agent, Cr(V I), were studied. Cr(V I) salts were dissolved in water effluent river receptors waters such as from the Rio de la Plata. The influence of abiotic factors present in this kind of water was evaluated using the Rec. assay in Bacillus subtilis. The results detected a soluble fraction that potentiated Cr(V I) genotoxicity. This substance (or group of substances) is sensible to sterilization by heat and UV radiation, and its activity seems to decrease with particulate matter. Its genotoxicity was not affected by high concentrations of particulate matter in the Rio de la Plata water. In samples where chromium salts were added to raw river water, abiotic interference due to sterilization process occurred. A decrease in genotoxicity was found after filtration through inorganic filters (0.22 μ m) and an increase was noticed after exposure to UV radiation. (Author)

  14. Genotoxic effects of boric acid and borax in zebrafish, Danio rerio using alkaline comet assay.

    Science.gov (United States)

    Gülsoy, Nagihan; Yavas, Cüneyd; Mutlu, Özal

    2015-01-01

    The present study is conducted to determine the potential mechanisms of Boron compounds, boric acid (BA) and borax (BX), on genotoxicity of zebrafish Danio rerio for 24, 48, 72 and 96-hours acute exposure (level:1, 4, 16, 64 mg/l BA and BX) in semi-static bioassay experiment. For that purpose, peripheral erythrocytes were drawn from caudal vein and Comet assay was applied to assess genotoxicity. Acute (96 hours) exposure and high concentrations of boric acid and borax increases % tail DNA and Olive tail moment. Genotoxicity was found for BA as concentration-dependent and BX as concentration and time dependent manner. In general, significant effects (P borax-induced genotoxicity in fish.

  15. Genotoxic Effects of Titanium Dioxide and Cerium Dioxide Nanoparticles in Human Respiratory Epithelial Cells

    Science.gov (United States)

    The nanomaterial industry has recently seen rapid growth, therefore, the risk assessment of human exposure to nanomaterials in consumer products is of paramount importance. The genotoxicity of nanomaterials is a fundamental aspect of hazard identification and regulatory guidance....

  16. The Genotoxicity of Titanium Dioxide and Cerium Dioxide Nanoparticles in Human Respiratory Epithelial Cells

    Science.gov (United States)

    Due to the exponential growth of the nanomaterial industry, risk assessment of human exposure to nanomaterials in consumer products is of paramount importance. The genotoxicity of nanomaterials is an important aspect of hazard identification and regulatory guidance. However, this...

  17. Cytotoxicity and genotoxicity assessment of Euphorbia hirta in MCF-7 cell line model using comet assay.

    Science.gov (United States)

    Ping, Kwan Yuet; Darah, Ibrahim; Chen, Yeng; Sasidharan, Sreenivasan

    2013-09-01

    To evaluate the cytotoxicity and genotoxicity activity of Euphorbia hirta (E. hirta) in MCF-7 cell line model using comet assay. The cytotoxicity of E. hirta extract was investigated by employing brine shrimp lethality assay and the genotoxicity of E. hirta was assessed by using Comet assay. Both toxicity tests exhibited significant toxicity result. In the comet assay, the E. hirta extract exhibited genotoxicity effects against MCF-7 DNA in a time-dependent manner by increasing mean percentage of DNA damage. The extract of E. hirta showed significant toxicity against brine shrimp with an LC₅₀ value of 620.382 µg/mL (24 h). Comparison with positive control potassium dichromate signifies that cytotoxicity exhibited by the methanol extract might have moderate activity. The present work confirmed the cytotoxicity and genotoxicity of E. hirta. However, the observed toxicity of E. hirta extracts needs to be confirmed in additional studies.

  18. Acute toxicity and genotoxicity of fermented traditional medicine oyaksungi-san

    Directory of Open Access Journals (Sweden)

    Hwayong Park

    2017-06-01

    Conclusion: As a whole, no acute toxicity or genotoxicity were observed in all the assays examined. Therefore, fermented OY is considered to be a safe material that can be used for development of complementary and alternative medicine using bioconversion.

  19. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  20. The use of ex vivo human skin tissue for genotoxicity testing

    International Nuclear Information System (INIS)

    Reus, Astrid A.; Usta, Mustafa; Krul, Cyrille A.M.

    2012-01-01

    As a result of the chemical legislation concerning the registration, evaluation, authorization and restriction of chemicals (REACH), and the Seventh Amendment to the Cosmetics Directive, which prohibits animal testing in Europe for cosmetics, alternative methods for safety evaluation of chemicals are urgently needed. Current in vitro genotoxicity assays are not sufficiently predictive for the in vivo situation, resulting in an unacceptably high number of misleading positives. For many chemicals and ingredients of personal care products the skin is the first site of contact, but there are no in vitro genotoxicity assays available in the skin for additional evaluation of positive or equivocal responses observed in regulatory in vitro genotoxicity assays. In the present study ex vivo human skin tissue obtained from surgery was used for genotoxicity evaluation of chemicals by using the comet assay. Fresh ex vivo human skin tissue was cultured in an air–liquid interface and topically exposed to 20 chemicals, including true positive, misleading positive and true negative genotoxins. Based on the results obtained in the present study, the sensitivity, specificity and accuracy of the ex vivo skin comet assay to predict in vivo genotoxicity were 89%, 90% and 89%, respectively. Donor and experimental variability were mainly reflected in the magnitude of the response and not the difference between the presence and absence of a genotoxic response. The present study indicates that human skin obtained from surgery is a promising and robust model for safety evaluation of chemicals that are in direct contact with the skin. -- Highlights: ► We use human skin obtained from surgery for genotoxicity evaluation of chemicals. ► We use the comet assay as parameter for genotoxicity in ex vivo human skin. ► Sensitivity, specificity and accuracy to predict in vivo genotoxins are determined. ► Sensitivity, specificity and accuracy are 89%, 90% and 90%, respectively. ► The method

  1. The use of ex vivo human skin tissue for genotoxicity testing

    Energy Technology Data Exchange (ETDEWEB)

    Reus, Astrid A.; Usta, Mustafa [TNO Triskelion BV, Utrechtseweg 48, 3704 HE, Zeist (Netherlands); Krul, Cyrille A.M., E-mail: cyrille.krul@tno.nl [TNO, Utrechtseweg 48, 3704 HE Zeist (Netherlands)

    2012-06-01

    As a result of the chemical legislation concerning the registration, evaluation, authorization and restriction of chemicals (REACH), and the Seventh Amendment to the Cosmetics Directive, which prohibits animal testing in Europe for cosmetics, alternative methods for safety evaluation of chemicals are urgently needed. Current in vitro genotoxicity assays are not sufficiently predictive for the in vivo situation, resulting in an unacceptably high number of misleading positives. For many chemicals and ingredients of personal care products the skin is the first site of contact, but there are no in vitro genotoxicity assays available in the skin for additional evaluation of positive or equivocal responses observed in regulatory in vitro genotoxicity assays. In the present study ex vivo human skin tissue obtained from surgery was used for genotoxicity evaluation of chemicals by using the comet assay. Fresh ex vivo human skin tissue was cultured in an air–liquid interface and topically exposed to 20 chemicals, including true positive, misleading positive and true negative genotoxins. Based on the results obtained in the present study, the sensitivity, specificity and accuracy of the ex vivo skin comet assay to predict in vivo genotoxicity were 89%, 90% and 89%, respectively. Donor and experimental variability were mainly reflected in the magnitude of the response and not the difference between the presence and absence of a genotoxic response. The present study indicates that human skin obtained from surgery is a promising and robust model for safety evaluation of chemicals that are in direct contact with the skin. -- Highlights: ► We use human skin obtained from surgery for genotoxicity evaluation of chemicals. ► We use the comet assay as parameter for genotoxicity in ex vivo human skin. ► Sensitivity, specificity and accuracy to predict in vivo genotoxins are determined. ► Sensitivity, specificity and accuracy are 89%, 90% and 90%, respectively. ► The method

  2. Mutagenic and genotoxic activity of particulate matter MP2,5, in Pamplona, North Santander, Colombia

    OpenAIRE

    Martínez Montañez, Mónica Liseth; Meléndez Gélvez, Iván; Quijano Parra, Alfonso

    2012-01-01

    Objective: To study the mutagenic and genotoxic activities of particulate material (MP2,5 collected in Pamplona, Norte de Santander, Colombia.Materials and methods: MP2,5 was monitored by means of a Partisol 2025 sequential air sampler with Plus Palmflex quartz filters. The latter were subjected to two extraction procedures: Soxhlet extraction using dichloromethane-acetone; and ultrasonic extraction using dichloromethane, acetone and dichloromethane/ acetone mix. The mutagenic and genotoxic a...

  3. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    killing infidels in their land. In order to mitigate attacks within the ANSF embedded Afghan intelligence agents to watch for any ANA soldier or ANP...said, “Americans use the word f--k all the time.” 37 Many Afghan troops take the meaning sexually , not as a meaningless expletive, the understanding

  4. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  5. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  6. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  8. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  9. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  10. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  11. Shark attack: review of 86 consecutive cases.

    Science.gov (United States)

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  12. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  15. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    Infiltrating GATES ............................................................................................................ 19 SCADA Vulnerability...not adequately protected; there isn’t sufficient guidance, or funding allocated to the security of our Supervisory Control and Data Acquisition ( SCADA ...attack against a vital system such as GATES, and instead focus her efforts on a less secure more conspicuous system 6 such as the SCADA systems

  16. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  17. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  18. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  19. Modeling of Aggregate Attacks on Complex Networks

    Directory of Open Access Journals (Sweden)

    F. Galindo

    2010-09-01

    Full Text Available An order factor in combinations of random and targeted attacks on modern scale free network model has been explored. Protection concepts based on timely restructuring of topologies have been discussed. Vulnerability parameter defined by investment value has been introduced, and protection financing strategies depending on node connectivity has been analyzed.

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks ... Single registrant; Most of the domains kept unresolved; Mostly being used for spamming and malware distribution; Many domains are listed as malicious; Poor process control by Domain Registrars.

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  2. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  3. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  4. Cytotoxicity and genotoxicity of clothianidin in human lymphocytes with or without metabolic activation system.

    Science.gov (United States)

    Atlı Şekeroğlu, Zülal; Şekeroğlu, Vedat; Uçgun, Ebru; Kontaş Yedier, Seval; Aydın, Birsen

    2018-02-26

    Clothianidin (CHN) is a broad-spectrum neonicotinoid insecticide. Limited studies have been carried out on the cytotoxic and genotoxic effects of both CHN using different genotoxicity tests in human cells with or without human metabolic activation system (S9 mix). Therefore, the aim of this study is to investigate the cytotoxic and genotoxic effects of CHN and its metabolites on human lymphocyte cultures with or without S9 mix using chromosomal aberration (CA) and micronucleus (MN) tests. The cultures were treated with 25, 50, and 100 µg/ml of CHN in the presence (3 h treatment) and absence (48 h treatment) of S9 mix. Dimethyl sulfoxide (DMSO) was used as a solvent control. CHN showed cytotoxic and genotoxic effects due to significant decreases in mitotic index (MI) and nuclear division index (NDI), and significant increases in the CAs, aberrant cells, and MN formation in the absence of S9 mix when compared with solvent control. However, CHN did not significantly induce cytotoxicity and genotoxicity in the presence of S9 mix. Our results indicated that CHN has cytotoxic, cytostatic, and genotoxic potential on human peripheral blood lymphocyte cultures, but not its metabolites under the experimental conditions.

  5. The genotoxic contribution of wood smoke to indoor respirable suspended particles

    Energy Technology Data Exchange (ETDEWEB)

    Boone, P.M. (John B. Pierce Foundation Laboratory, New Haven, CT (USA)); Rossman, T.G. (New York Univ. Medical Center, New York (USA)); Daisey, J.M. (Lawrence Berkeley Laboratory, CA (USA))

    1989-01-01

    The effect of wood burning stoves on the genotoxicity of indoor respirable organic matter was investigated for four homes during the winter and spring of 1986. Paired samples, one collected when the stove was not used and one when wood was burned, were extracted with dichloromethane and acetone. Aliquots of the dichloromethane extracts were analyzed with and without metabolic activation using the Microscreen bioassay. The Microscreen is a rapid, sensitive bioassay which measures a broad genotoxic endpoint, {lambda}-prophage induction. Per nanogram of organic material, wood smoke proved to be a major source of indirect (observed with metabolic activation) but not direct genotoxins in homes. The increase in indirect genotoxicity for extracts from aerosol containing wood smoke is probably due to higher concentrations of polycyclic aromatic hydrocarbons in the wood smoke aerosol as well as other unidentified classes. The direct genotoxicity observed for extracts of aerosol not containing wood smoke decreased with metabolic activation. This direct genotoxicity may be related to cooking activities in the homes. The trends in genotoxicity observed per nanogram of organic material are more pronounced when expressed per m{sup 3} of air due to the higher percentage of extractable material in aerosol containing wood smoke.

  6. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  7. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  9. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  10. In vivo micronucleus test as a biomarker of genotoxicity in free-range goats from suspected contaminated environment

    Directory of Open Access Journals (Sweden)

    Afusat Jagun Jubril

    2017-09-01

    Conclusion: The finding indicates the prevalence and frequency of micronucleus as a biomarker of genotoxicity and an indicator of exposure to environmental genotoxic subtances. Hence, this highlights the relevance of these goats as important sentinel animal model. These findings, therefore, serve as a preliminary data for further studies on the latent genotoxic environmental contaminants and their potential deleterious impact. [J Adv Vet Anim Res 2017; 4(3.000: 281-287

  11. Improved control of exogenous attention in action video game players.

    Science.gov (United States)

    Cain, Matthew S; Prinzmetal, William; Shimamura, Arthur P; Landau, Ayelet N

    2014-01-01

    Action video game players (VGPs) have demonstrated a number of attentional advantages over non-players. Here, we propose that many of those benefits might be underpinned by improved control over exogenous (i.e., stimulus-driven) attention. To test this we used an anti-cueing task, in which a sudden-onset cue indicated that the target would likely appear in a separate location on the opposite side of the fixation point. When the time between the cue onset and the target onset was short (40 ms), non-players (nVGPs) showed a typical exogenous attention effect. Their response times were faster to targets presented at the cued (but less probable) location compared with the opposite (more probable) location. VGPs, however, were less likely to have their attention drawn to the location of the cue. When the onset asynchrony was long (600 ms), VGPs and nVGPs were equally able to endogenously shift their attention to the likely (opposite) target location. In order to rule out processing-speed differences as an explanation for this result, we also tested VGPs and nVGPs on an attentional blink (AB) task. In a version of the AB task that minimized demands on task switching and iconic memory, VGPs and nVGPs did not differ in second target identification performance (i.e., VGPs had the same magnitude of AB as nVGPs), suggesting that the anti-cueing results were due to flexible control over exogenous attention rather than to more general speed-of-processing differences.

  12. Improved control of exogenous attention in action video game players

    Directory of Open Access Journals (Sweden)

    Matthew S Cain

    2014-02-01

    Full Text Available Action video game players have demonstrated a number of attentional advantages over non-players. Here, we propose that many of those benefits might be underpinned by improved control over exogenous (i.e., stimulus-driven attention. To test this we used an anti-cuing task, in which a sudden-onset cue indicated that the target would likely appear in a separate location on the opposite side of the fixation point. When the time between the cue onset and the target onset was short (40 ms, non-players (nVGPs showed a typical exogenous attention effect. Their response times were faster to targets presented at the cued (but less probable location compared with the opposite (more probable location. Video game players (VGPs, however, were less likely to have their attention drawn to the location of the cue. When the onset asynchrony was long (600 ms, VGPs and nVGPs were equally able to endogenously shift their attention to the likely (opposite target location. In order to rule out processing-speed differences as an explanation for this result, we also tested VGPs and nVGPs on an attentional blink task. In a version of the attentional blink task that minimized demands on task switching and iconic memory, VGPs and nVGPs did not differ in second target identification performance (i.e., VGPs had the same magnitude of attentional blink as nVGPs, suggesting that the anti-cuing results were due to flexible control over exogenous attention rather than to more general speed-of-processing differences.

  13. Exogenous lipoid pneumonia: HRCT, MR, and pathologic findings

    Energy Technology Data Exchange (ETDEWEB)

    Laurent, F.; Philippe, J.C. [Department of Medical Imaging, Diagnostic and Interventional Radiology, University of Bordeaux (France); Vergier, B. [Department of Pathology, University of Bordeaux, Bordeaux (France); Granger-Veron, B.; Darpeix, B.; Vergeret, J.; Blanc, P. [Department of Pneumology, University of Bordeaux, F-33000 Bordeaux (France); Velly, J.F. [Department of Thoracic Surgery, University of Bordeaux, F-33000 Bordeaux (France)

    1999-08-01

    The objective of this study was to describe high-resolution CT (HRCT) and MR findings of exogenous lipoid pneumonia and to correlate them with pathologic findings. A retrospective review of the medical records of our institution revealed seven patients with a diagnosis of lipoid pneumonia based on clinical data, chest films, bronchoalveolar lavage, and follow-up. Both HRCT and MR imaging were reviewed by two readers. Pathologic examination of the resected specimen or surgical biopsies were also reviewed in the four available cases. The HRCT findings were pulmonary consolidations (n = 6) with fatty (n = 3) or unspecific but low attenuation values (n = 3), areas of ground-glass opacities (n = 5), septal lines, and centrilobular interstitial thickening (n = 5). In five of the seven cases, a crazy-paving pattern of various spread was also present, either isolated (n = 1) or surrounding a pulmonary consolidation. In two cases traction bronchiectasis and cystic changes consistent with fibrosis were seen. At MR imaging (n = 2) a pulmonary consolidation of high signal intensity on T1-weighted image consistent with lipid content was present in one case. Pathologic examination (n = 4) showed the coexistence of lobules with lesions of various ages, sometimes in contiguous lobules, within the same patient. Recent lesions were those with alveolar fill-in by spumous macrophages and almost normal alveolar walls and septae. In more advanced lesions, lobules were filled in with larger vacuoles often surrounded by inflammatory infiltrates of alveolar walls, bronchiolar walls, and septa. The oldest lesions were characterized by fibrosis and parenchymal distortion around large lipid-containing vacuoles. The HRCT findings reflect pathologic findings in exogenous lipoid pneumonia. Although non-specific, consolidation areas of low attenuation values and crazy-paving pattern are frequently associated in exogenous lipoid pneumonia and are indicative of the diagnosis. (orig.) With 3 figs

  14. Exogenous lipoid pneumonia: HRCT, MR, and pathologic findings

    International Nuclear Information System (INIS)

    Laurent, F.; Philippe, J.C.; Vergier, B.; Granger-Veron, B.; Darpeix, B.; Vergeret, J.; Blanc, P.; Velly, J.F.

    1999-01-01

    The objective of this study was to describe high-resolution CT (HRCT) and MR findings of exogenous lipoid pneumonia and to correlate them with pathologic findings. A retrospective review of the medical records of our institution revealed seven patients with a diagnosis of lipoid pneumonia based on clinical data, chest films, bronchoalveolar lavage, and follow-up. Both HRCT and MR imaging were reviewed by two readers. Pathologic examination of the resected specimen or surgical biopsies were also reviewed in the four available cases. The HRCT findings were pulmonary consolidations (n = 6) with fatty (n = 3) or unspecific but low attenuation values (n = 3), areas of ground-glass opacities (n = 5), septal lines, and centrilobular interstitial thickening (n = 5). In five of the seven cases, a crazy-paving pattern of various spread was also present, either isolated (n = 1) or surrounding a pulmonary consolidation. In two cases traction bronchiectasis and cystic changes consistent with fibrosis were seen. At MR imaging (n = 2) a pulmonary consolidation of high signal intensity on T1-weighted image consistent with lipid content was present in one case. Pathologic examination (n = 4) showed the coexistence of lobules with lesions of various ages, sometimes in contiguous lobules, within the same patient. Recent lesions were those with alveolar fill-in by spumous macrophages and almost normal alveolar walls and septae. In more advanced lesions, lobules were filled in with larger vacuoles often surrounded by inflammatory infiltrates of alveolar walls, bronchiolar walls, and septa. The oldest lesions were characterized by fibrosis and parenchymal distortion around large lipid-containing vacuoles. The HRCT findings reflect pathologic findings in exogenous lipoid pneumonia. Although non-specific, consolidation areas of low attenuation values and crazy-paving pattern are frequently associated in exogenous lipoid pneumonia and are indicative of the diagnosis. (orig.)

  15. Technological response to economic disruption: The role of new technologies in mitigating exogenous economic shocks

    Science.gov (United States)

    Spencer, Aron Scott

    2003-07-01

    The three essays in this dissertation deal with the role of technology in mitigating economic disruption. Much research has been done on the disruptive effects of technology; in contrast, these essays look at how technology can be used to reduce the effects of exogenous disruptions. Each essay looks at the issue at a different level; the first at the firm level, the second at the industry level and the final essay at the level of the national economy. The first essay examines the options and possible strategies for firms faced with increased instability in their electricity supply, as recently occurred in California. This paper develops response strategies for companies affected by an electrical crisis. These responses fall into three categories: Lead, Follow, or Get Out of the State. The technologies available to companies choosing to lead are reviewed, along with constraints to their adoption. From these strategies, it can be shown that areas with unstable electrical markets can expect a loss of firms to locales with less risk and uncertainty, unless governments adopt policies promoting distributed generation. The second essay projects the economic impacts of the adoption of high-temperature superconductor (FITS) technologies in electric generation, transmission, and distribution systems. Three technologies utilizing high-temperature superconductors are analyzed for their potential impact on the electrical utility industry. Distributed superconducting magnetic energy storage systems (D-SMES), superconducting cable, and HTS generators are each described along with their possible uses in the electrical utility industry. The economic impact of these technologies is then projected, along with a comparison between them and conventional technologies. The third essay deals with the role of technology in mitigating the economic effects of the reaction to terrorist attacks. In the wake of the terrorist attacks of September 11, 2001, public and private investments are

  16. Exogenous pyruvate accelerates glycolysis and promotes capacitation in human spermatozoa

    Science.gov (United States)

    Hereng, T.H.; Elgstøen, K.B.P.; Cederkvist, F.H.; Eide, L.; Jahnsen, T.; Skålhegg, B.S.; Rosendal, K.R.

    2011-01-01

    BACKGROUND There has been an ongoing debate in the reproductive field about whether mammalian spermatozoa rely on glycolysis, oxidative phosphorylation or both for their energy production. Recent studies have proposed that human spermatozoa depend mainly on glucose for motility and fertilization but the mechanism behind an efficient glycolysis in human spermatozoa is not well understood. Here, we demonstrate how human spermatozoa utilize exogenous pyruvate to enhance glycolytic ATP production, motility, hyperactivation and capacitation, events that are crucial for male fertility. METHODS Purified human spermatozoa from healthy donors were incubated under capacitating conditions (including albumin, bicarbonate and glucose) and tested for changes in ATP levels, motility, hyperactivation and tyrosine phosphorylation after treatment with pyruvate. The experiments were repeated in the presence of sodium cyanide in order to assess the contribution from mitochondrial respiration. The metabolism of 13C labeled glucose and pyruvate was traced by a combination of liquid chromatography and mass spectrometry. RESULTS The treatment of human spermatozoa with exogenous pyruvate increased intracellular ATP levels, progressive motility and hyperactivation by 56, 21 and 130%, respectively. In addition, added pyruvate induced a significant increase in tyrosine phosphorylation levels. Blocking of the electron transport chain did not markedly affect the results, indicating that the mechanism is independent of oxidative phosphorylation. However, the observed effects could be counteracted by oxamate, an inhibitor of lactate dehydrogenase (LDH). Metabolic tracing experiments revealed that the observed rise in ATP concentration resulted from an enhanced glycolytic flux, which was increased by more than 50% in the presence of exogenous pyruvate. Moreover, all consumed 13C labeled pyruvate added was converted to lactate rather than oxidized in the tricarboxylic acid cycle. CONCLUSIONS Human

  17. Capture of exogenous attention modulates the attentional blink

    DEFF Research Database (Denmark)

    Nielsen, Simon; Andersen, Tobias

    2011-01-01

    When two targets (T1 & T2) are presented in rapid succession, observers often fail to report T2 if they attend to T1. Bottleneck theories propose that this attentional blink (AB) is due to T1 occupying a slow processing stage when T2 is presented. Accordingly, if increasing T1 difficulty increases...... the AB have reported inconsistent results. For example, some found a negative correlation between T1 contrast and T2 performance (Chua, 2005) where others find a positive correlation (Christmann & Leuthold, 2004). Here, we use additive Gaussian noise to tease apart the exogenous capture effect from...

  18. Capture of exogenous attention modulates the attentional blink

    DEFF Research Database (Denmark)

    Nielsen, Simon; Andersen, Tobias

    2011-01-01

    the AB have reported inconsistent results. For example, some found a negative correlation between T1 contrast and T2 performance (Chua, 2005) where others find a positive correlation (Christmann & Leuthold, 2004). Here, we use additive Gaussian noise to tease apart the exogenous capture effect from...... the effect of T1 contrast. The capture effect is varied by the overall contrast energy for signal and noise. In two T1 conditions we adjust T1 performance to 60% by signal to noise ratio (SNR) but vary T1 contrast energy between conditions. From 17 observers we find that T2 performance correlates negatively...

  19. EXOGENOUS ADMINISTRATION OF OXYTOCIN AND ITS RESIDUAL EFFECTS

    Directory of Open Access Journals (Sweden)

    A. IJAZ AND M. ALEEM

    2006-04-01

    Full Text Available Oxytocin is a peptide hormone which is synthesized in the hypothalamic neurons and released from the posterior pituitary gland. This hormone has a wide range of applications in human and veterinary medicine. Whether secreted endogenously or administered exogenously, it produces the desired effects within minutes and is metabolized rapidly into inactive products. If at all oxytocin is secreted in the milk and is ingested alongwith milk, it is degraded by the gut enzymes and can not reach blood circulation in biologically active form. Thus, there seems to be no harm in consuming milk from oxytocin-treated dairy animals. However, its use in pregnant animals should be discouraged.

  20. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  1. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    Science.gov (United States)

    ... Attack or Sudden Cardiac Arrest: How Are They Different? Updated:Mar 15,2018 People often use these ... The heart attack symptoms in women can be different than men. What is cardiac arrest? Sudden cardiac ...

  2. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    ... responsible for the attack. This paper examines case studies of political conflicts that have led to attacks on cyber systems, such as the recent clashes between India and Pakistan, Israel and the Palestinians, and NATO...

  3. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  4. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  5. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  6. Cytotoxic, mutagenicity, and genotoxicity effects of guanylhydrazone derivatives.

    Science.gov (United States)

    Pinhatti, Valéria Rodrigues; da Silva, Juliana; Martins, Tales Leandro Costa; Moura, Dinara Jaqueline; Rosa, Renato Moreira; Villela, Izabel; Stopiglia, Cheila Denise Ottonelli; da Silva Santos, Selma; Scroferneker, Maria Lúcia; Machado, Carlos Renato; Saffi, Jenifer; Henriques, João Antonio Pêgas

    2016-08-01

    Several studies have reported that guanylhydrazones display a variety of desirable biological properties, such as antihypertensive, antibacterial, and antimalarial behaviour. They furthermore promote anti-pneumocystosis and anti-trypanosomiasis, exhibit antitumor activity, and show significant cytotoxicity against cancer cell lines. In this work, we have evaluated the cytotoxicity, mutagenicity, and genotoxicity of two guanylhydrazones derivatives, (E)-2-[(2,3-dimethoxyphenyl) methylene] hydrazine carboxymidamide hydrochloride (2,3-DMeB) and (E)-2-[(3,4-dimethoxyphenyl) methylene] hydrazine carboxymidamide hydrochloride (3,4-DMeB), in different biological models. Both 2,3-DMeB and 3,4-DMeB induce weak cytotoxic and mutagenic effects in bacteria and yeast. The genotoxicity of these compounds was determined in a fibroblast cell line (V79) using alkaline comet assay, as well as a modified comet assay with bacterial enzymes formamidopyrimidine DNA-glycosylase (FPG) and endonuclease III (EndoIII). Both guanylhydrazone derivatives induced DNA damage. Treatment of V79 cells with EndoIII and FPG proteins demonstrated a significant effect of 2,3-DMeB and 3,4-DMeB with respect to oxidized bases. In addition, the derivatives induced a significant increase in the frequency of micronucleated cells at high doses. The antifungal and anti-trypanosomal properties of these guanylhydrazone derivatives were also evaluated, and the obtained results suggest that 2,3-DMeB is more effective than 3,4-DMeB. The biological activity of 2,3-DMeB and 3,4-DMeB may thus be related, at least in part, to their oxidative potential, as well as to their ability to interact with DNA. Considering the previously reported in vitro antitumor activity of guanylhydrazone derivatives in combination with the lack of acute toxicity and the fact that DNA damage is only observed at high doses should render both compounds good candidates for in vivo studies on antitumor activity. Copyright © 2016 Elsevier B

  7. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  8. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  9. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  10. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  11. Presentation attack detection in voice biometrics

    OpenAIRE

    Korshunov, Pavel; Marcel, Sébastien; Vielhauer, Claus

    2017-01-01

    Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be ...

  12. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    necessarily reflect the views of the Department of Defense. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with...and identify cyber attacks reflects the “arms race” na- ture of the cyber domain. While defenders develop new and improved techniques to detect known...Trost. Digging into ShellShock Exploitation attempts using ShockPot Data. https://www.threatstream.com/ blog /shockpot-exploitation-analysis, September

  13. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  14. Static magnetic field reduced exogenous oligonucleotide uptake by spermatozoa using magnetic nanoparticle gene delivery system

    Science.gov (United States)

    Katebi, Samira; Esmaeili, Abolghasem; Ghaedi, Kamran

    2016-03-01

    Spermatozoa could introduce exogenous oligonucleotides of interest to the oocyte. The most important reason of low efficiency of sperm mediated gene transfer (SMGT) is low uptake of exogenous DNA by spermatozoa. The aim of this study was to evaluate the effects of static magnetic field on exogenous oligonucleotide uptake of spermatozoa using magnetofection method. Magnetic nanoparticles (MNPs) associated with the labeled oligonucleotides were used to increase the efficiency of exogenous oligonucleotide uptake by rooster spermatozoa. We used high-field/high-gradient magnet (NdFeB) to enhance and accelerate exogenous DNA sedimentation at the spermatozoa surface. Flow cytometry analysis was performed to measure viability and percentage of exogenous oligonucleotide uptake by sperm. Flow cytometry analysis showed a significant increase in exogenous oligonucleotide uptake by rooster spermatozoa (Pspermatozoa were incubated in exogenous oligonucleotide solution and MNPs. However, by applying static magnetic field during magnetofection method, a significant decrease in exogenous oligonucleotide uptake was observed (Pspermatozoa; however unlike others studies, static magnetic field, was not only ineffective to enhance exogenous oligonucleotide uptake by rooster spermatozoa but also led to reduction in efficiency of magnetic nanoparticles in gene transfer.

  15. Attacking Paper-Based E2E Voting Systems

    Science.gov (United States)

    Kelsey, John; Regenscheid, Andrew; Moran, Tal; Chaum, David

    In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.

  16. Genotoxicity of antiobesity drug orlistat and effect of caffeine intervention: an in vitro study.

    Science.gov (United States)

    Chakrabarti, Manoswini; Ghosh, Ilika; Jana, Aditi; Ghosh, Manosij; Mukherjee, Anita

    2017-07-01

    Obesity is a major global health problem associated with various adverse effects. Pharmacological interventions are often necessary for the management of obesity. Orlistat is an FDA-approved antiobesity drug which is a potent inhibitor of intestinal lipases. In the current study, orlistat was evaluated for its genotoxic potential in human lymphocyte cells in vitro and was compared with that of another antiobesity drug sibutramine, presently withdrawn from market due its undesirable health effects. Caffeine intake may be an additional burden in people using anorectic drugs, therefore, further work is needed to be carried out to evaluate the possible effects of caffeine on orlistat-induced DNA damage. Human lymphocytes were exposed to orlistat (250, 500 and 1000 μg/ml), sibutramine (250, 500 and 1000 μg/ml) and caffeine (25, 50, 75, 100, 125 and 150 μg/ml) to assess their genotoxicity by comet assay in vitro. In addition, lymphocytes were co-incubated with caffeine (50, 75 and 100 μg/ml) and a single concentration of orlistat (250 μg/ml). Orlistat and sibutramine were genotoxic at all concentrations tested, sibutramine being more genotoxic. Caffeine was found to be genotoxic at concentrations 125 μg/ml and above. Co-treatment of orlistat with non-genotoxic concentrations (50, 75 and 100 μg/ml) of caffeine lead to a decrease in DNA damage. Orlistat can induce DNA damage in human lymphocytes in vitro and caffeine was found to reduce orlistat-induced genotoxicity.

  17. The cytotoxicity and genotoxicity of soluble and particulate cobalt in human lung fibroblast cells

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Leah J.; Holmes, Amie L. [Wise Laboratory of Environmental and Genetic Toxicology, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Maine Center for Environmental Toxicology and Health, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Department of Applied Medical Science, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Kandpal, Sanjeev Kumar; Mason, Michael D. [Department of Chemical and Biological Engineering, University of Maine, Orono, ME (United States); Zheng, Tongzhang [Department of Environmental Health Sciences, Yale School of Public Health, New Haven, CT (United States); Wise, John Pierce, E-mail: John.Wise@usm.maine.edu [Wise Laboratory of Environmental and Genetic Toxicology, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Maine Center for Environmental Toxicology and Health, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States); Department of Applied Medical Science, University of Southern Maine, 96 Falmouth St., P.O. Box 9300, Portland, ME 04101-9300 (United States)

    2014-08-01

    Cobalt exposure is increasing as cobalt demand rises worldwide due to its use in enhancing rechargeable battery efficiency, super-alloys, and magnetic products. Cobalt is considered a possible human carcinogen with the lung being a primary target. However, few studies have considered cobalt-induced toxicity in human lung cells. Therefore, in this study, we sought to determine the cytotoxicity and genotoxicity of particulate and soluble cobalt in human lung cells. Cobalt oxide and cobalt chloride were used as representative particulate and soluble cobalt compounds, respectively. Exposure to both particulate and soluble cobalt induced a concentration-dependent increase in cytotoxicity, genotoxicity, and intracellular cobalt ion levels. Based on intracellular cobalt ion levels, we found that soluble cobalt was more cytotoxic than particulate cobalt while particulate and soluble cobalt induced similar levels of genotoxicity. However, soluble cobalt induced cell cycle arrest indicated by the lack of metaphases at much lower intracellular cobalt concentrations compared to cobalt oxide. Accordingly, we investigated the role of particle internalization in cobalt oxide-induced toxicity and found that particle-cell contact was necessary to induce cytotoxicity and genotoxicity after cobalt exposure. These data indicate that cobalt compounds are cytotoxic and genotoxic to human lung fibroblasts, and solubility plays a key role in cobalt-induced lung toxicity. - Highlights: • Particulate and soluble cobalt are cytotoxic and genotoxic to human lung cells. • Soluble cobalt induces more cytotoxicity compared to particulate cobalt. • Soluble and particulate cobalt induce similar levels of genotoxicity. • Particle-cell contact is required for particulate cobalt-induced toxicity.

  18. Effects of exogenous testosterone on isolated rabbit corpus cavernosum penis.

    Science.gov (United States)

    Yildirim, S; Utkan, T; Yildirim, K; Sarioglu, Y

    2000-02-01

    To study the effects of exogenous excess of testosterone on the constricting effect of phenylephrine and endothelium-dependent and -independent relaxing effects of different agonists in the corpus cavernosum penis (CCP). Specimens of the CCP were obtained from rabbits testosterone for 1 and 2 months and untreated for 2 months after testosterone-treatment for 2 months. Preparations were mounted between two parallel platinum electrodes in organ baths. Responses to phenylephrine, carbachol, and sodium nitroprusside were obtained by adding the reagent cumulatively to the bath. The phenylephrine-induced contractions were decreased with no change in agonist potency (pD2 value) after both 1 and 2 month testosterone-treatment and did not return to control values in corpus cavernosum obtained from rabbits untreated for 2 months after testosterone-treatment for 2 months. Testosterone treatment for 1 or 2 months increased the endothelium-dependent relaxations induced by carbachol and decreased the relaxations elicited by electric stimulation but did not affect the relaxations induced by sodium nitroprusside. These relaxant responses to carbachol and electric stimulation did not return to control values in corpus cavernosum obtained from rabbits untreated for 2 months after testosterone-treatment for 2 months. There were no significant changes in the pD2 values calculated by agonist-induced relaxation responses in all testosterone-treatment groups compared with control group. The exogenous excess of testosterone plays an important role in erectile function by a direct action on the relaxant and contractile responses of CCP.

  19. Exogenous orienting of visual-spatial attention in ADHD children.

    Science.gov (United States)

    Ortega, Rodrigo; López, Vladimir; Carrasco, Ximena; Anllo-Vento, Lourdes; Aboitiz, Francisco

    2013-02-01

    Visual spatial orienting of attention towards exogenous cues has been one of the attentional functions considered to be spared in ADHD. Here we present a design in which 60 (30 ADHD) children, age: 10.9±1.4, were asked to covertly orient their attention to one or two (out of four) cued locations, and search for a target stimulus in one of these locations, while recording behavioral responses and EEG/ERP. In all conditions, ADHD children showed delayed reaction times and poorer behavioral performance. They also exhibited larger cue-elicited P2 but reduced CNV in the preparation stage. Larger amplitude of CNV predicted better performance in the task. Target-elicited N1 and selection negativity were also reduced in the ADHD group compared to non-ADHD. Groups also differed in the early and late P3 time-windows. The present results suggest that exogenous orienting of attention could be dysfunctional in ADHD under certain conditions. This limitation is not necessarily caused by an impairment of the orienting process itself, but instead by a difficulty in maintaining the relevant information acquired during the early preparation stage through the target processing stage, when it is really needed. Copyright © 2012 Elsevier B.V. All rights reserved.

  20. The interactions of multisensory integration with endogenous and exogenous attention

    Science.gov (United States)

    Tang, Xiaoyu; Wu, Jinglong; Shen, Yong

    2016-01-01

    Stimuli from multiple sensory organs can be integrated into a coherent representation through multiple phases of multisensory processing; this phenomenon is called multisensory integration. Multisensory integration can interact with attention. Here, we propose a framework in which attention modulates multisensory processing in both endogenous (goal-driven) and exogenous (stimulus-driven) ways. Moreover, multisensory integration exerts not only bottom-up but also top-down control over attention. Specifically, we propose the following: (1) endogenous attentional selectivity acts on multiple levels of multisensory processing to determine the extent to which simultaneous stimuli from different modalities can be integrated; (2) integrated multisensory events exert top-down control on attentional capture via multisensory search templates that are stored in the brain; (3) integrated multisensory events can capture attention efficiently, even in quite complex circumstances, due to their increased salience compared to unimodal events and can thus improve search accuracy; and (4) within a multisensory object, endogenous attention can spread from one modality to another in an exogenous manner. PMID:26546734

  1. The interactions of multisensory integration with endogenous and exogenous attention.

    Science.gov (United States)

    Tang, Xiaoyu; Wu, Jinglong; Shen, Yong

    2016-02-01

    Stimuli from multiple sensory organs can be integrated into a coherent representation through multiple phases of multisensory processing; this phenomenon is called multisensory integration. Multisensory integration can interact with attention. Here, we propose a framework in which attention modulates multisensory processing in both endogenous (goal-driven) and exogenous (stimulus-driven) ways. Moreover, multisensory integration exerts not only bottom-up but also top-down control over attention. Specifically, we propose the following: (1) endogenous attentional selectivity acts on multiple levels of multisensory processing to determine the extent to which simultaneous stimuli from different modalities can be integrated; (2) integrated multisensory events exert top-down control on attentional capture via multisensory search templates that are stored in the brain; (3) integrated multisensory events can capture attention efficiently, even in quite complex circumstances, due to their increased salience compared to unimodal events and can thus improve search accuracy; and (4) within a multisensory object, endogenous attention can spread from one modality to another in an exogenous manner. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Electrophysiological evidence for inhibition of return effect in exogenous orienting.

    Science.gov (United States)

    Yang, Dong; Yao, Shuxia; Ding, Cody; Qi, Senqing; Lei, Yan

    2012-09-01

    Although the inhibition of return (IOR) effect in exogenous orienting has been investigated extensively with the Posnerian cuing paradigm, there has been little evidence for the role of attentional processes in the IOR effect. The N2pc component was used as a marker of the deployment of spatial attention to isolate attentional processes in the IOR effect. Participants responded to task-relevant target displays that were preceded by cue displays in a non-predictive, exogenous cuing paradigm. A 1,000 ms of stimulus onset asynchrony (SOA) was designed to investigate the IOR effect. Behavioral results indicate that the SOA was sufficiently long to cause an IOR effect in the discrimination task. As for ERP patterns elicited by targets, the N2pc amplitudes were similar across cue types, but the N2pc latency was delayed when targets appeared at the cued location rather than at the uncued location. N2pc patterns demonstrated that the spatial attentional process is indeed an important mechanism underlying the IOR effect. The delayed N2pc for targets in the valid cue type suggested that IOR effect may reflect a delayed deployment of spatial attention to targets appearing at recently cued locations.

  3. Dynamic Financial Constraints: Distinguishing Mechanism Design from Exogenously Incomplete Regimes.

    Science.gov (United States)

    Karaivanov, Alexander; Townsend, Robert M

    2014-05-01

    We formulate and solve a range of dynamic models of constrained credit/insurance that allow for moral hazard and limited commitment. We compare them to full insurance and exogenously incomplete financial regimes (autarky, saving only, borrowing and lending in a single asset). We develop computational methods based on mechanism design, linear programming, and maximum likelihood to estimate, compare, and statistically test these alternative dynamic models with financial/information constraints. Our methods can use both cross-sectional and panel data and allow for measurement error and unobserved heterogeneity. We estimate the models using data on Thai households running small businesses from two separate samples. We find that in the rural sample, the exogenously incomplete saving only and borrowing regimes provide the best fit using data on consumption, business assets, investment, and income. Family and other networks help consumption smoothing there, as in a moral hazard constrained regime. In contrast, in urban areas, we find mechanism design financial/information regimes that are decidedly less constrained, with the moral hazard model fitting best combined business and consumption data. We perform numerous robustness checks in both the Thai data and in Monte Carlo simulations and compare our maximum likelihood criterion with results from other metrics and data not used in the estimation. A prototypical counterfactual policy evaluation exercise using the estimation results is also featured.

  4. Exogenous Testosterone Enhances the Reactivity to Social Provocation in Males

    Directory of Open Access Journals (Sweden)

    Lisa Wagels

    2018-03-01

    Full Text Available Testosterone affects human social behavior in various ways. While testosterone effects are generally associated with muscular strength and aggressiveness, human studies also point towards enhanced status–seeking motives after testosterone administration. The current study tested the causal influence of exogenous testosterone on male behavior during a competitive provocation paradigm. In this double blind, randomized, placebo (PL-controlled study, 103 males were assigned to a PL or testosterone group receiving a colorless PL or testosterone gel. To induce provocation, males played a rigged reaction time game against an ostensible opponent. When participants lost, the opponent subtracted money from the participant who in return could subtract money from the ostensible opponent. Participants subjectively indicated anger and self-estimated treatment affiliation (testosterone or PL administration. A trial-by-trial analysis demonstrated that provocation and success during the repeated games had a stronger influence on participants’ choice to reduce money from the opponent if they had received testosterone. Participants who believed to be in the testosterone group were angrier after the experiment and increased monetary reductions during the task course. In line with theories about mechanisms of testosterone in humans, provocation is shown to be necessary for the agency of exogenous testosterone. Thus, testosterone reinforces the conditional adjustment of aggressive behavior but not aggressive behavior per se. In contrast undirected frustration is not increased by testosterone but probably interferes with cognitive appraisals about biological mechanisms of testosterone.

  5. Exogenous Testosterone Enhances the Reactivity to Social Provocation in Males.

    Science.gov (United States)

    Wagels, Lisa; Votinov, Mikhail; Kellermann, Thilo; Eisert, Albrecht; Beyer, Cordian; Habel, Ute

    2018-01-01

    Testosterone affects human social behavior in various ways. While testosterone effects are generally associated with muscular strength and aggressiveness, human studies also point towards enhanced status-seeking motives after testosterone administration. The current study tested the causal influence of exogenous testosterone on male behavior during a competitive provocation paradigm. In this double blind, randomized, placebo (PL)-controlled study, 103 males were assigned to a PL or testosterone group receiving a colorless PL or testosterone gel. To induce provocation, males played a rigged reaction time game against an ostensible opponent. When participants lost, the opponent subtracted money from the participant who in return could subtract money from the ostensible opponent. Participants subjectively indicated anger and self-estimated treatment affiliation (testosterone or PL administration). A trial-by-trial analysis demonstrated that provocation and success during the repeated games had a stronger influence on participants' choice to reduce money from the opponent if they had received testosterone. Participants who believed to be in the testosterone group were angrier after the experiment and increased monetary reductions during the task course. In line with theories about mechanisms of testosterone in humans, provocation is shown to be necessary for the agency of exogenous testosterone. Thus, testosterone reinforces the conditional adjustment of aggressive behavior but not aggressive behavior per se . In contrast undirected frustration is not increased by testosterone but probably interferes with cognitive appraisals about biological mechanisms of testosterone.

  6. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  7. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  8. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  9. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  10. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  12. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  13. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  14. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  15. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  16. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  17. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  18. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  19. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  20. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  1. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  2. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  3. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  4. Nano-QSAR: Genotoxicity of Multi-Walled Carbon Nanotubes

    International Nuclear Information System (INIS)

    Toropova, A. P.; Toropov, A. A.; Rallo, R.; Leszczynska, D.; Leszczynski, J.

    2016-01-01

    The study was carried out to develop an efficient approach for prediction the genotoxicity of carbon nano tubes. The experimental data on the bacterial reverse mutation test (TA100) on multi-walled carbon nano tubes was collected from the literature and examined as an endpoint. By means of the optimal descriptors calculated with the Monte Carlo method a mathematical model of the endpoint was built up. The model is represented by a function of: (i) dose (μg/plate); (ii) metabolic activation (i.e. with S9 mix or without S9 mix); and (iii) two types of multi-walled carbon nano tubes. The above listed conditions were represented by so-called quasi-SMILES. Simplified molecular input-line entry system (SMILES) is a tool for representation of molecular structure. The quasi-SMILES is a tool to represent physicochemical and / or biochemical conditions for building up a predictive model. Thus, instead of well-known paradigm of predictive modeling “endpoint is a mathematical function of molecular structure” a fresh paradigm “endpoint is a mathematical function of available eclectic data (conditions) is suggested.

  5. Sewage sludge does not induce genotoxicity and carcinogenesis

    Science.gov (United States)

    Silva, Paula Regina Pereira; Barbisan, Luis Fernando; Dagli, Maria Lúcia Zaidan; Saldiva, Paulo Hilário Nascimento

    2012-01-01

    Through a series of experiments, the genotoxic/mutagenic and carcinogenic potential of sewage sludge was assessed. Male Wistar rats were randomly assigned to four groups: Group 1 - negative control; Group 2 - liver carcinogenesis initiated by diethylnitrosamine (DEN; 200 mg/kg i.p.); Group 3 and G4-liver carcinogenesis initiated by DEN and fed 10,000 ppm or 50,000 ppm of sewage sludge. The animals were submitted to a 70% partial hepatectomy at the 3rd week. Livers were processed for routine histological analysis and immunohistochemistry, in order to detect glutathione S-transferase positive altered hepatocyte foci (GST-P+ AHF). Peripheral blood samples for the comet assay were obtained from the periorbital plexus immediately prior to sacrificing. Polychromatic erythrocytes (PCEs) were analyzed in femoral bone-marrow smears, and the frequencies of those micronucleated (MNPCEs) registered. There was no sewage-sludge-induced increase in frequency of either DNA damage in peripheral blood leucocytes, or MNPCEs in the femoral bone marrow. Also, there was no increase in the levels of DNA damage, in the frequency of MNPCEs, and in the development of GST-P AHF when compared with the respective control group. PMID:23055806

  6. In vivo studies on genotoxicity of a soil fumigant, dazomet.

    Science.gov (United States)

    Peluso, M; Bolognesi, C; Munnia, A; Landini, E; Parodi, S

    1998-01-01

    Dazomet is a soil fumigant effective against germinating weed seeds, nematodes, soil fungi, and soil insects. Dazomet is primarily used for preplanting control in tobacco and forest nursery crops and is now marketed for a wider range of open field and greenhouse crops (e.g., vegetables, fruits, ornamental plants, lawns, and turfs). Swiss CD1 male and female mice were intraperitoneally treated with dazomet in order to evaluate its potential genotoxicity. DNA damage activity, namely, DNA single-strand breaks, DNA adducts, and increased micronuclei frequency due to treatment with the soil fumigant was observed in the experimental animals. Dose-dependent DNA adduct formation was detected in the liver, kidneys, and lungs of mice. DNA adduct levels in these three organs were 6.0 +/- 0.4 (SD), 4.8 +/- 0.1 (SD), and 2.2 +/- 0.4 (SD) adducts/10(8) nucleotides, respectively, at the highest dose of the soil fumigant tested (90 mg/kg). No adduct formation was observed in control mice. A significant increase in DNA single-strand breaks was detected in the liver and kidneys of mice treated with 100 mg/kg of dazomet (P < 0.05). A significant increase in micronuclei frequency was observed in the bone marrow of mice treated with 100 mg/kg of dazomet (P < 0.05).

  7. Identification of consensus biomarkers for predicting non-genotoxic hepatocarcinogens

    Science.gov (United States)

    Huang, Shan-Han; Tung, Chun-Wei

    2017-01-01

    The assessment of non-genotoxic hepatocarcinogens (NGHCs) is currently relying on two-year rodent bioassays. Toxicogenomics biomarkers provide a potential alternative method for the prioritization of NGHCs that could be useful for risk assessment. However, previous studies using inconsistently classified chemicals as the training set and a single microarray dataset concluded no consensus biomarkers. In this study, 4 consensus biomarkers of A2m, Ca3, Cxcl1, and Cyp8b1 were identified from four large-scale microarray datasets of the one-day single maximum tolerated dose and a large set of chemicals without inconsistent classifications. Machine learning techniques were subsequently applied to develop prediction models for NGHCs. The final bagging decision tree models were constructed with an average AUC performance of 0.803 for an independent test. A set of 16 chemicals with controversial classifications were reclassified according to the consensus biomarkers. The developed prediction models and identified consensus biomarkers are expected to be potential alternative methods for prioritization of NGHCs for further experimental validation.

  8. Genotoxic effects of produced waters in mosquito fish (Gambusia affinis).

    Science.gov (United States)

    Caliani, Ilaria; Porcelloni, Serena; Mori, Gabriele; Frenzilli, Giada; Ferraro, Maria; Marsili, Letizia; Casini, Silvia; Fossi, Maria Cristina

    2009-01-01

    The aim of this study was to assess the potential genotoxic effects of produced water (PW) from an Italian on-shore oil plant. Produced water is a complex mixture containing residual hydrocarbons, trace elements, naturally occurring radioactive material and potentially toxic treatment chemicals such as biocides, dispersants, detergents and scale inhibitors used in oil production. The test organism, mosquito fish (Gambusia affinis), was divided into male and female groups and exposed for 8 days in the laboratory to 50% concentrations of different produced waters: PW before treatment and after settling treatment. The fish were also exposed to lower concentrations (10%) of the same PW for 30 days. DNA damage was evaluated in erythrocytes by single cell gel electrophoresis (Comet assay) and micronucleus test, while an oxidative stress biomarker, was assessed. Polycyclic aromatic hydrocarbons (PAH) metabolites in bile were also evaluated. A higher sensitivity in biomarker responses was found in females in comparison to males. An increase in DNA strand breaks was observed in both genders after 30 days exposure and a statistically significant increase of micronucleated cells was found in females after 8 days exposure. A positive correlation between presence of micronucleated cells and PAH metabolites in bile was also observed.

  9. Metabolism and genotoxicity of aromatic amines in aquatic organisms

    International Nuclear Information System (INIS)

    Knezovich, J.P.; Krauter, P.W.; Lawton, M.P.; Harrison, F.L.

    1987-01-01

    Marine mussels (Mytilus edulis) and bullfrog tadpoles (Rana catesbeiana) were used to investigate the comparative metabolism and genotoxicity of aromatic amines in vivo. These organisms were selected because they possess distinctly different metabolic capabilities: mussels lack an active mixed-function-oxidase enzyme system that is present in most other organisms, including amphibians. Using 14 C-labeled chemical probes (o- and p-toluidine, 2-aminofluorene (2-AF), and 2-acetylaminofluorene (2-AAF)), mussels and tadpoles well dosed with individual compounds by direct immersion in aqueous solutions. The identities of metabolites were then determined by HPLC and GC/MS methods. Results indicate that the N-conjugating pathways used by mussels result primarily in the detoxification of aromatic amines by limiting the amount of primary amine available for activation. The tadpoles excreted a number of 2-AAF metabolites but did form DNA and protein adducts in the liver. Induction of micronuclei in the peripheral red blood cells was also demonstrated. The tadpole was shown to be a sensitive biological indicator of pollution in aquatic ecosystems

  10. Deoxynivalenol induces cytotoxicity and genotoxicity in animal primary cell culture.

    Science.gov (United States)

    Singh, Shweta; Banerjee, Subham; Chattopadhyay, Pronobesh; Borthakur, Sashin Kumar; Veer, Vijay

    2015-03-01

    Deoxynivalenol (DON), a mycotoxin produced by Fusarium graminearum, is widely found as a contaminant of food. DON is responsible for a wide range of toxic activities, including gastro-intestinal, lymphoid, bone-marrow and cardiotoxicity. But, the complete explorations of toxicity in terms of hepatotoxicity, nephrotoxicity, cytotoxicity and genotoxicity as well have not been documented well. Again, the mechanisms through which DON damages the DNA and promotes cellular toxicity are not well established. Considering the above fact, this research article is focused on the effects of DON-induced toxicities on experimental animal model as well as its effects on cellular level via various toxicological investigations. DON treatment showed cytotoxicity and DNA damage. Further, flow cytometric analysis of hepatocytes showed cellular apoptosis, suggesting that DON-induced hepatotoxicity is, may be partly, mediated by apoptosis. Moreover, significant differences were found in each haematology and clinical chemistry value, either (p > 0.05). No abnormality of any organ was found during histopathological examination. Hence, it can be concluded that DON induces oxidative DNA damage and increases the formation of centromere positive micronuclei due to aneugenic activity.

  11. Genotoxicity testing of Ambelania occidentalis (Apocynaceae) leaf extract in vivo.

    Science.gov (United States)

    Castro, L S; Perazzo, F F; Maistro, E L

    2009-04-22

    Ambelania occidentalis is routinely used in folk medicine for treating gastrointestinal disorders, even though there have been no safety trials. We evaluated the genotoxic potential of hydro-alcoholic extracts of this plant in mice; induced DNA damage was assessed in peripheral blood leukocytes and micronucleus induction was assessed in polychromatic erythrocytes from bone marrow. The extract was administered by an oral route at single doses of 1000, 1500 and 2000 mg/kg body weight. N-nitroso-N-ethylurea was used as a positive control. The comet assay was performed on peripheral blood leukocytes at 4 and 24 h after treatment, and the micronucleus test was carried out on bone marrow cells collected at 24 and 48 h after treatment. The ratio of polychromatic/normochromatic erythrocytes was scored for cytotoxicity assessment. No increase in the number of micronucleated polychromatic erythrocytes from bone marrow or in leukocyte DNA damage was observed. The hydro-alcoholic extracts of A. occidentalis had no mutagenic or cytotoxic effects in the mouse cells.

  12. Bacterial reduction in genotoxicity of Direct Red 28 dye.

    Science.gov (United States)

    Bafana, Amit; Jain, Minakshi; Agrawal, Gaurav; Chakrabarti, Tapan

    2009-03-01

    Direct Red 28 (DR28) is a benzidine-based azo dye widely used in several countries. It has also been a subject of intense research for its anti-prion activity. Like other benzidine-based azo dyes, it is also carcinogenic and toxic. However, there are very few studies addressing its detoxification. In the present study, a Bacillus velezensis strain was used for detoxification of DR28. Toxicity was checked by a battery of highly sensitive genotoxicity assays like comet assay, DNA ladder formation, terminal deoxynucleotidyl transferase-mediated dUTP nick-end labeling assay and flow cytometric Annexin V binding assay. HL-60 cell line was used as the test system. All the assays showed an initial increase in toxicity upon biodegradation due to release of mutagenic products, like benzidine and 4-aminobiphenyl, from the dye. These intermediates caused significant DNA damage and induced apoptosis in HL-60 cells. Then the culture degraded these mutagenic intermediates, due to which the toxicity was reduced gradually, finally resulting in nearly complete detoxification.

  13. Exogenous DNA internalisation by sperm cells is improved by combining lipofection and restriction enzyme mediated integration.

    Science.gov (United States)

    Churchil, R R; Gupta, J; Singh, A; Sharma, D

    2011-06-01

    1. Three types of exogenous DNA inserts, i.e. complete linearised pVIVO2-GFP/LacZ vector (9620 bp), the LacZ gene (5317 bp) and the GFP gene (2152 bp) were used to transfect chicken spermatozoa through simple incubation of sperm cells with insert. 2. PCR assay, Dot Blot hybridisation and Southern hybridisation showed the successful internalisation of exogenous DNA by chicken sperm cells. 3. Lipofection and Restriction Enzyme Mediated Integration (REMI) were used to improve the rate of internalisation of exogenous DNA by sperm cells. 4. Results from dot blot as well as Southern hybridisation were semi-quantified and improved exogenous DNA uptake by sperm cells through lipofection and REMI. Stronger signals were observed from hybridisation of LacZ as well as GFP specific probe with the DNA from lipofected exogenous DNA transfected sperm DNA in comparison with those transfected with nude exogenous DNA.

  14. Genotoxicity reduction in bagasse waste of sugar industry by earthworm technology.

    Science.gov (United States)

    Bhat, Sartaj Ahmad; Singh, Jaswinder; Vig, Adarsh Pal

    2016-01-01

    The aim of the present study was to assess the genotoxicity reduction in post vermicompost feed mixtures of bagasse (B) waste using earthworm Eisenia fetida. The genotoxicity of bagasse waste was determined by using Allium cepa root chromosomal aberration assay. Bagasse was amended with cattle dung in different proportions [0:100 (B0) 25:75 (B25), 50:50 (B50), 75:25 (B75) and 100:0 (B100)] on dry weight basis. Genotoxic effects of initial and post vermicompost bagasse extracts were analysed on the root tips cells of Allium cepa. Root length and mitotic index (MI) was found to be increased in post vermicompost extracts when compared to initial bagasse waste. The maximum percent increase of root length was observed in the B50 bagasse extract (96.60 %) and the maximum MI was observed in B100 mixture (14.20 ± 0.60) 6 h treatment which was similar to the control. Genotoxicity analysis of post vermicompost extracts of bagasse revealed a 21-44 % decline in the aberration frequencies and the maximum reduction was found in B75 extract (44.50 %). The increase in root length and mitotic index, as well as decrease in chromosomal aberrations indicates that E. fetida has the ability to reduce the genotoxicity of the bagasse waste.

  15. Assessment of Genotoxicity of Ionizing radiation using Tradescantia-Comet assay

    Energy Technology Data Exchange (ETDEWEB)

    Han, Min; Ryu, Tae Ho; Hyun, Kyung Man; Kim, Jin Kyu [Korea Atomic Energy Research Institute, Jeongeup (Korea, Republic of); Wilhelmova, Nad [Institute of Experimental Botany, Prague (Czech Republic)

    2010-05-15

    Over the last two decades, several new methodologies for the detection of DNA damage have been developed. The comet assay is currently used in different areas of biological sciences to detect DNA damage. The comet assay, also called the single cell gel electrophoresis (SCGE) was first introduced by Ostling and Johanson as a microelectrophoretic technique for the direct visualization of DNA damage in individual cells. The comet assay, due to its simplicity, sensitivity and need of a few cells, is ideal as a short-term genotoxicity test. The comet assay can theoretically be applied to every type of eukaryotic cell, including plant cells. Plants are very useful as monitors of genetic effects caused by pollution in the atmosphere, water and soil. Although the genotoxic effects detected by Tradescantia tests cannot be associated with mutagenesis or even carcinogenesis in humans, these bioassays are very useful tools for screening the mutagenic potential in the environment. Experiments were conducted to study the genotoxic effects of ionizing radiations on the genome integrity, particularly of Tradescantia. The increasingly frequent use of Tradescantia as a sensitive environmental bioindicator of genotoxic effects. This study was designed to assess the genotoxicity of ionizing radiation using Tradescnatia-comet assay

  16. AFFINITY BIOSENSOR BASED ON SCREEN-PRINTED ELECTRODE MODIFIED WITH DNA FOR GENOTOXIC COMPOUNDS DETECTION

    Directory of Open Access Journals (Sweden)

    Bambang Kuswandi

    2010-06-01

    Full Text Available An electrochemical method for the detection of the genotoxic compounds using a DNA-modified electrode was developed. This electrode was successfully used for the electrochemical detection of genotoxic compounds in water samples. The electrochemical results clearly demonstrated that, the development is related to the molecular interaction between the surface-linked DNA obtained from calf thymus and the target compounds, such as pollutants, in order to develop a simple device for rapid screening of genotoxic compounds in environmental samples. The detection of such compounds was measured by their effect on the oxidation signal of the guanine peak of the DNA immobilised on the surface of carbon based Screen-Printed Electrode (SPE in disposable mode, and monitored by square-wave voltametric analysis. The DNA biosensor is able to detect known intercalating and groove-binding genotoxic compounds such as Dioxin, Bisphenol A, PCBs, and Phtalates. Application to real water samples is discussed and reported.   Keywords: electrochemical, screen-printed electrode, DNA biosensor, genotoxic compounds

  17. Ecotoxicological and Genotoxic Evaluation of Buenos Aires City (Argentina Hospital Wastewater

    Directory of Open Access Journals (Sweden)

    Anahí Magdaleno

    2014-01-01

    Full Text Available Hospital wastewater (HWW constitutes a potential risk to the ecosystems and human health due to the presence of toxic and genotoxic chemical compounds. In the present work we investigated toxicity and genotoxicity of wastewaters from the public hospital of Buenos Aires (Argentina. The effluent from the sewage treatment plant (STP serving around 10 million inhabitants was also evaluated. The study was carried out between April and September 2012. Toxicity and genotoxicity assessment was performed using the green algae Pseudokirchneriella subcapitata and the Allium cepa test, respectively. Toxicity assay showed that 55% of the samples were toxic to the algae (%I of growth between 23.9 and 54.8. The A. cepa test showed that 40% of the samples were genotoxic. The analysis of chromosome aberrations (CA and micronucleus (MN showed no significant differences between days and significant differences between months. The sample from the STP was not genotoxic to A. cepa but toxic to the algae (%I = 41%, showing that sewage treatment was not totally effective. This study highlights the need for environmental control programs and the establishment of advanced and effective effluent treatment plants in the hospitals, which are merely dumping the wastewaters in the municipal sewerage system.

  18. Mutagenic and genotoxic activity of particulate matter MP2,5, in Pamplona, North Santander, Colombia

    Directory of Open Access Journals (Sweden)

    Martínez Montañez, Mónica Liseth

    2012-10-01

    Full Text Available Objective: To study the mutagenic and genotoxic activities of particulate material (MP2,5 collected in Pamplona, Norte de Santander, Colombia.Materials and methods: MP2,5 was monitored by means of a Partisol 2025 sequential air sampler with Plus Palmflex quartz filters. The latter were subjected to two extraction procedures: Soxhlet extraction using dichloromethane-acetone; and ultrasonic extraction using dichloromethane, acetone and dichloromethane/ acetone mix. The mutagenic and genotoxic activities were determined for each extract.Results: This is the first study conducted in Colombia that reports the mutagenic and genotoxic activities associated with particulate matter (MP2,5 taken from vehicular emissions in Pamplona, Norte de Santander. The mutagenic assay determined by the Ames test using Salmonella typhimurium strains TA98 and TA100 showed a high direct mutagenic activity in the analyzed extracts. On the other hand, the genotoxic activity, determined by means of the comet assay, was high too.Conclusion: Particulate material (MP2,5 present in air samples in Pamplona (northeastern Colombia is a risk factor for the exposed population because it can directly induce mutations and also cause genotoxic damage.

  19. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  20. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    OpenAIRE

    Khaled Elleithy; Drazen Blagovic; Wang Cheng; Paul Sideleau

    2005-01-01

    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack wil...