WorldWideScience

Sample records for external sulfate attack

  1. Experimental and numerical study on cement paste degradation under external sulfate attack

    NARCIS (Netherlands)

    Ma, X.; Copuroglu, O.; Schlangen, H.E.J.G.; Han, N; Xing, F; Saouma, V.; Bolander, J.; Landis, E.

    2016-01-01

    External sulfate attack is one of the situations that may cause gradual but severe damage in cementitious materials, which may lead to cracking, increased permeability and strength loss. In this paper, thin-walled hollow cement paste cylinders with a wall thickness of 2.5mm were made considering the

  2. External sulfate attack in dam concretes with thaumasite formation

    Directory of Open Access Journals (Sweden)

    Chinchón-Payá, S.

    2015-03-01

    Full Text Available Concrete core samples extracted from different areas of the Mequinenza Dam (Spain have been studied and expansive reactions affecting the structure were not found. However, expansive reactions in the concrete of certain parts located near the abutments of two galleries have been observed as a consequence of an external sulfate attack due to the sulfur compounds contained in the lignites that are present on the surrounding terrain. Secondary gypsum, ettringite, and thaumasite, as well as several sulfate efflorescence have been detected. The thaumasite formed in the degraded concrete is related to a Thaumasite Sulfate Attack (TSA. Scanning Electron Microscopy (SEM and Rietveld analyses of the TSA samples would show that thaumasite could have been formed thanks to ettringite acting as nuclei or by a direct precipitation from solutions within the pores of the cement matrix.Se han estudiado testigos de hormigón extraídos de diferentes zonas de la presa de Mequinenza (España descartando la existencia de una reacción expansiva que pudiera afectar a la estructura. Sin embargo, se han observado reacciones expansivas en el hormigón de ciertas zonas próximas a los estribos de dos galerías, como consecuencia de un ataque sulfático externo debido a los compuestos de azufre contenidos en los lignitos que están presentes en los terrenos circundantes. Se ha identificado un conjunto de productos relacionados con el ataque sulfático: yeso secundario, ettringita y thaumasita, además de sales sulfatadas solubles. Las zonas más degradadas del hormigón coinciden con una cristalización abundante de thaumasita (Thaumasite Sulfate Attack–TSA-. El estudio de las muestras de TSA, mediante microscopía electrónica de barrido (SEM y el método de Rietveld, indicaría que la thaumasita podría haberse formado a partir de la ettringita como medio de nucleación o por precipitación directa a partir de sus componentes en disolución dentro de los poros de la

  3. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  4. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  5. Damage modelling in concrete subject to sulfate attack

    Directory of Open Access Journals (Sweden)

    N. Cefis

    2014-07-01

    Full Text Available In this paper, we consider the mechanical effect of the sulfate attack on concrete. The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.

  6. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  7. Coupled mechanical and chemo-transport model for the simulation of cementitious materials subjected to external sulfate attack

    International Nuclear Information System (INIS)

    Bary, B.; Le Bescop, P.; Leterrier, N.; Deville, E.

    2012-01-01

    We propose in this study to develop a chemo-transport-mechanical model for the simulation of external sulfate attack in cementitious materials. This degradation mainly consists in the hydrate decalcification/dissolution due to leaching, and in the reaction between the sulfate ions migrating within the material and mono-sulfate initially present to precipitate into ettringite. It may generate macroscopic expansions leading to severe microcracking. The key point in this study is the use of the integration numerical platform ALLIANCES which couples a code solving the chemical equations, the diffusion of ionic species into the porosity and the mechanical problem. The crystallization pressures resulting from the interaction between growing mono-sulfate crystals and the surrounding C-S-H matrix are assumed to cause the observed macroscopic swelling. A macroscopic bulk strain tensor calculated from the volume of formed ettringite is introduced for directly reproducing these expansions. Explicit up-scaling techniques applied on a simplified representation of the materials allow estimating both mechanical and diffusive properties of the evolving microstructure. The calculated macroscopic free expansions are in quite good agreement with experimental data, provided a correct calibration of the parameter involved in the expression of the bulk strain tensor. However, it is asserted that the model would lead to very high stress levels in the structures in the particular case of restrained displacements at its boundaries

  8. Effect of metakaolin on external sulfate attack

    Energy Technology Data Exchange (ETDEWEB)

    Ramlochan, T.; Thomas, M. [Toronto Univ., Dept. of Civil Engineering, ON (Canada)

    2000-07-01

    The effect of high reactivity metakaolin (HRM) on the sulfate resistance of mortars was studied. Mortar bars with three cements of varying C{sub 3}A content were used for the experiment. After a six month exposure to a 5 per cent solution of sodium sulfate, mortar bars incorporating any level of HRM as a partial replacement for a high-C{sub 3}A was considered 'moderately sulfate resistant'; mortar bars with HRM and a moderate or low C{sub 3}A content as 'high sulfate resistant'. It was also determined that for long term sulfate resistance 15 per cent HRM or more may be required, depending on the C{sub 3}A content. The performance of HRM was found to be significantly influenced by the water-cementitious material ratio, and in turn, by permeability, suggesting that HRM might increase sulfate resistance more by lowering the permeability of the concrete than by any chemical action. 7 refs., 4 tabs., 7 figs.

  9. Controlling sulfate attack in Mississippi Department of Transportation structures

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  10. Controlling sulfate attack in Mississippi Department of Transportation structures.

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  11. Effects of the addition of micro silica on the durability of mortars exposed to the sodium sulfate attack

    International Nuclear Information System (INIS)

    Nasser, C.; Meriam, M.

    2012-01-01

    This article presents a detailed experimental study on the sulfate attack of mortars of self compacting concrete, and the effectiveness of employs micro silica and limestone fillers in the minimization of the damage resulting from such an attack. The test solution used to supply the sulfate ions and the cations was the sodium sulfate solution 4.5%. The solution saturated with lime was employed as the reference solution. The main variables investigated in the study were the type of cement and mineral addition. The expansion measured on p rims of mortar of (40x40x160) millimeters was employed to estimate their durability after exposure to the sodium sulfate solution attack during 91 days-Specimens of mortars were visually examined to assess the extent of deterioration due to the sulfate attack. The x-ray diffraction was used to evaluate the microstructural nature of the sulfate attack. The test results proved that the use of micro silica had a beneficial effect on the expansion due to the sodium sulfate attack. While mortars with limestone filler have undergoes degradation even with the use of cement resistant to sulfates. (authors).

  12. Experiment Analysis of Concrete’s Mechanical Property Deterioration Suffered Sulfate Attack and Drying-Wetting Cycles

    Directory of Open Access Journals (Sweden)

    Wei Tian

    2017-01-01

    Full Text Available The mechanism of concrete deterioration in sodium sulfate solution is investigated. The macroperformance was characterized via its apparent properties, mass loss, and compressive strength. Changes in ions in the solution at different sulfate attack periods were tested by inductively coupled plasma (ICP. The damage evolution law, as well as analysis of the concrete’s meso- and microstructure, was revealed by scanning electron microscope (SEM and computed tomography (CT scanning equipment. The results show that the characteristics of concrete differed at each sulfate attack period; the drying-wetting cycles generally accelerated the deterioration process of concrete. In the early sulfate attack period, the pore structure of the concrete was filled with sulfate attack products (e.g., ettringite and gypsum, and its mass and strength increased. The pore size and porosity decreased while the CT number increased. As deterioration progressed, the swelling/expansion force of products and the salt crystallization pressure of sulfate crystals acted on the inner wall of the concrete to accumulate damage and accelerate deterioration. The mass and strength of concrete sharply decreased. The number and volume of pores increased, and the pore grew more quickly resulting in initiation and expansion of microcracks while the CT number decreased.

  13. Influence of recycled fine aggregates on the resistance of mortars to magnesium sulfate attack

    International Nuclear Information System (INIS)

    Lee, Seung-Tae

    2009-01-01

    The influence of recycled fine aggregates, which had been reclaimed from field-demolished concretes, on the resistance of mortar specimens to magnesium sulfate attack was investigated. Mortar specimens were prepared with recycled fine aggregates at different replacement levels (0%, 25%, 50%, 75% and 100% of natural fine aggregate by mass). The mortar specimens were exposed to 4.24% magnesium sulfate solution for about 1 year at ambient temperature, and regularly monitored for visual appearance, compressive strength loss and expansion. Additionally, in order to identify products of magnesium sulfate attack, mortar samples incorporating 0%, 25% and 100% replacement levels of the recycled fine aggregates were examined by X-ray diffraction (XRD) technique. Experimental results confirmed that the use of recycled fine aggregates up to a maximum 50% replacement level is effective under severe magnesium sulfate environment, irrespective of type of recycled fine aggregates. However, the worse performance was observed in mortar specimens incorporating 100% replacement level. It was found that the water absorption of recycled fine aggregates affected deterioration of mortar specimens, especially at a higher replacement level. XRD results indicated that the main cause of deterioration of the mortar specimens was primarily due to the formation of gypsum and thaumasite by magnesium sulfate attack. In addition, it appeared that the conversion of C-S-H into M-S-H by the attack probably influenced mechanical deterioration of mortar specimens with recycled fine aggregates.

  14. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel

    2012-12-27

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young\\'s modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  15. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel; Guessasma, Sofiane

    2012-01-01

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young's modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  16. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    Directory of Open Access Journals (Sweden)

    Atta-ur-Rehman

    2018-02-01

    Full Text Available In this study, the effects of titanium dioxide (TiO2 nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50 were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM, Energy Dispersive Spectroscopy (EDS, X-ray Diffraction (XRD, Thermogravimetry Analysis (TGA and Differential Scanning Calorimetry (DSC tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack.

  17. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  18. Behaviour of cementitious materials: sulfates and temperature actions

    International Nuclear Information System (INIS)

    Barbarulo, Remi

    2002-09-01

    The research work presented in this Ph.D. thesis is related to the nuclear waste underground repository concept. Concrete could be used in such a repository, and would be subjected to variations of temperature in presence of sulfate, a situation that could induce expansion of concrete. The research was lead in three parts: an experimental study of the possibility of an internal sulfate attack on mortars; an experimental study and modeling of the chemical equilibriums of the CaO-SiO 2 -Al 2 O 3 -SO 3 -H 2 O system; and a modeling of the mechanisms of internal and external sulfate attacks, and the effect of temperature. The results show that mortars can develop expansions after a steam-cure during hydration, but also when a long steam-cure is applied to one-year-old mortars, which is a new point. Ettringite precipitation can be considered as responsible for these expansions. The experimental study of the CaO-SiO 2 -Al 2 O 3 -SO 3 -H 2 O system clarified the role of Calcium Silicate Hydrates (C-S-H) on chemical equilibriums of cementitious materials. Sulfate sorption on C-S-H has been studied in detail. The quantity of sulfate bound to the C-S-H mainly depends on the sulfate concentration in solution, on the Ca/Si ratio of the C-S-H and is not significantly influenced by temperature. Aluminium inclusion in the C-S-H seems to be a significant phenomenon. Temperature increases the calcium sulfo-aluminate solubilities and thus increases sulfates concentration in solution. A modeling of the chemical system is proposed. Simulations of external sulfate attack (15 mmol/L of Na 2 SO 4 ) predict ettringite precipitation at 20 and 85±C. Simulation of internal sulfate attack was performed at a local scale (a hydrated cement grain). An initial inhomogeneity can lead, after a thermal curing at 85±C, to ettringite precipitation in zones originally free from ettringite. This new-formed ettringite could be the origin of the expansions. (author) [fr

  19. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  20. The thaumasite form of sulfate attack in concrete of Yongan Dam

    International Nuclear Information System (INIS)

    Hu Mingyu; Long Fumei; Tang Mingshu

    2006-01-01

    According to microanalytical investigations, it is shown that the concrete of Yongan Dam is deteriorated due to the thaumasite form of sulfate attack (TSA). Analysis results of scanning electron microscopy (SEM), Energy Disperse X-ray (EDX) and X-ray Diffraction (XRD) are supported by the analysis of the concrete composition and the geographical conditions of the dam

  1. Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete

    Directory of Open Access Journals (Sweden)

    Nada Mahdi Fawzi

    2015-08-01

    Full Text Available One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC have been studied in the present study. The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO3 in gravel. The results show that considering the total effective sulfate content is better than the total content of sulfates since the effect of sulfate in each constituent of concrete, depends on it's granular size .The smaller the particle size of the material the more effective is the sulfate in it. Therefore, it is recommended to follow the Iraqi specification for total effective sulfate content, because it gives more flexibility to the use of sand and gravel with higher sulfate content. The results of compressive strength at 90-days show that the effect of total effective SO3 content of ( 2.647% , 2.992% , 3.424% that correspond to total sulfate of ( 3.778%, 3.294%, 4.528% decrease the compressive strength by (7.53%, 11.44%, 14.59% respectively.

  2. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    International Nuclear Information System (INIS)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Rinder, Thomas; Klammer, Dietmar; Leis, Albrecht; Tritthart, Josef; Dietzel, Martin

    2013-01-01

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L −1 of SO 4 and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L −1 of SO 4 and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as 2 H/H and 18 O/ 16 O isotope ratios of H 2 O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the

  3. Physical and microstructural aspects of sulfate attack on ordinary and limestone blended Portland cements

    International Nuclear Information System (INIS)

    Schmidt, Thomas; Lothenbach, Barbara; Romer, Michael; Neuenschwander, Juerg; Scrivener, Karen

    2009-01-01

    The consequences of external sulfate attack were investigated by traditional test methods, i.e. length and mass change, as well as by a newly developed, surface sensitive ultrasonic method, using Leaky Rayleigh waves (1 MHz). The macroscopic changes are discussed and compared with thermodynamic calculations and microstructural findings (SEM/EDS). The results show that the main impact of limestone additions on resistance to sulfate degradation are physical - i.e. addition of a few percent in Portland cement reduces the porosity and increases the resistance of Portland cement systems to sulfate; but higher addition of 25% increase porosity and lower resistance to sulfate. The kinetics of degradation were dramatically affected by the solution concentration (4 or 44 g Na 2 SO 4 /l) and the higher concentration also resulted in the formation of gypsum, which did not occur at the low concentration. However the pattern of cracking was similar in both cases and it appears that gypsum precipitates opportunistically in pre-formed cracks so it is not considered as making a significant contribution to the degradation. At 8 deg. C limited formation of thaumasite occurred in the surface region of the samples made from cement with limestone additions. This thaumasite formation led to loss of cohesion of the paste and loss of material from the surface of the samples. However thaumasite formation was always preceded by expansion and cracking of the samples due to ettringite formation and given the very slow kinetics of thaumasite formation it was probably facilitated by the opening up of the structure due to ettringite induced cracking. The expansion of the samples showed a steady stage, followed by a rapidly accelerating stage, with destruction of the samples. The onset of the rapidly accelerating stage occurred when the thickness of the cracked surface layer reached about 1-1.5 mm-10-15% of the total specimen thickness (10 mm).

  4. Sulfate resistance of nanosilica contained Portland cement mortars

    Science.gov (United States)

    Batilov, Iani B.

    Soils, sea water and ground water high in sulfates are commonly encountered hostile environments that can attack the structure of concrete via chemical and physical mechanisms which can lead to costly repairs or replacement. Sulfate attack is a slow acting deteriorative phenomenon that can result in cracking, spalling, expansion, increased permeability, paste-to-aggregate bond loss, paste softening, strength loss, and ultimately, progressive failure of concrete. In the presented research study, Portland cement (PC) mortars containing 1.5% to 6.0% nanosilica (nS) cement replacement by weight were tested for sulfate resistance through full submersion in sodium sulfate to simulate external sulfate attack. Mortars with comparable levels of cement replacement were also prepared with microsilica (mS). Three cement types were chosen to explore nS' effectiveness to reduce sulfate expansion, when paired with cements of varying tricalcium aluminate (C3A) content and Blaine fineness, and compare it to that of mS. Mortars were also made with combined cement replacement of equal parts nS and mS to identify if they were mutually compatible and beneficial towards sulfate resistance. Besides sulfate attack expansion of mortar bars, the testing program included investigations into transport and microstructure properties via water absorption, sulfate ion permeability, porosimetry, SEM with EDS, laser diffraction, compressive strength, and heat of hydration. Expansion measurements indicated that mS replacement mortars outperformed both powder form nS, and nS/mS combined replacement mixtures. A negative effect of the dry nS powder replacement attributed to agglomeration of its nanoparticles during mixing negated the expected superior filler, paste densification, and pozzolanic activity of the nanomaterial. Agglomerated nS was identified as the root cause behind poor performance of nS in comparison to mS for all cement types, and the control when paired with a low C3A sulfate resistant

  5. The influence of alkali-free and alkaline shotcrete accelerators within cement systems Influence of the temperature on the sulfate attack mechanisms and damage

    International Nuclear Information System (INIS)

    Paglia, C.; Wombacher, F.; Boehni, H.

    2003-01-01

    The resistance to sulfate attack of mixtures accelerated with alkali-free and alkaline accelerators was found to be mainly influenced by the Al 3+ and SO 4 2- added via the admixtures. Microstructural observations showed decalcification and disintegration of the CSH gel, which acted as an additional Ca 2+ supplier as compared to the CH for ettringite formation. The CSH decalcification was mainly observed with a homogeneous distribution of the alkali-free admixture. The disintegration of the CSH gel increased the porosity and allowed more sulfate solution to penetrate into the specimens. This process promoted the swelling of the specimens and directly contributed to the expansion, explaining the lack of a direct relationship between the ettringite formation and the expansion. Moreover, the CSH gel disintegration, typical for MgSO 4 attack, also occurred with Na 2 SO 4 solutions and depending on the aluminate-sulfate distribution and the extent of the CSH gel disintegration, different damage types were detected. At higher temperatures (65 deg. C) the damage was mainly controlled by the growth, the rearrangement and the thermal stability of ettringite

  6. Testing Silica Fume-Based Concrete Composites under Chemical and Microbiological Sulfate Attacks

    Directory of Open Access Journals (Sweden)

    Adriana Estokova

    2016-04-01

    Full Text Available Current design practices based on descriptive approaches to concrete specification may not be appropriate for the management of aggressive environments. In this study, the durability of cement-based materials with and without the addition of silica fume, subjected to conditions that leach calcium and silicon, were investigated. Chemical corrosion was simulated by employing various H2SO4 and MgSO4 solutions, and biological corrosion was simulated using Acidithiobacillus sp. bacterial inoculation, leading to disrupted and damaged surfaces; the samples’ mass changes were studied following both chemical and biological attacks. Different leaching trends were observed via X-ray fluorescence when comparing chemical with biological leaching. Lower leaching rates were found for concrete samples fortified with silica fume than those without silica fume. X-ray diffraction and scanning electron microscopy confirmed a massive sulfate precipitate formation on the concrete surface due to bacterial exposure.

  7. [Efficacy and safety of tulobuterol patch versus oral salbutamol sulfate in children with mild or moderate acute attack of bronchial asthma: a comparative study].

    Science.gov (United States)

    Lin, Qian; Liu, Quan-Hua; Bao, Yi-Xiao

    2013-06-01

    To compare tulobuterol patch and oral salbutamol sulfate in terms of efficacy and safety in children with mild or moderate acute attack of bronchial asthma. A total of 92 children with mild and moderate acute asthmatic attack were randomly divided into salbutamol group (n=46) and tulobuterol group (n=46). Both groups received routine treatment with antihistamine, selective leukotriene receptor antagonist and glucocorticoid. In addition, the salbutamol group was given slow-release capsules of salbutamol sulfate, and the tulobuterol group was treated with tulobuterol patch. The two groups were compared with respect to symptom scores of cough, wheeze, respiratory rate, wheezing sound, three depression sign and peak expiratory flow, as well as adverse events. As the treatment proceeded, symptom scores decreased in both groups; on the third day of treatment, all symptom scores except cough score showed a significant decrease in both groups (Pattack.

  8. Evaluation of sulfate resistance of cement mortars containing black rice husk ash.

    Science.gov (United States)

    Chatveera, B; Lertwattanaruk, P

    2009-03-01

    In this paper, black rice husk ashes (BRHAs), which are agrowastes from an electricity generating power plant and a rice mill, were ground and used as a partial cement replacement. The durability of mortars under sulfate attack including expansion and compressive strength loss were investigated. For parametric study, BRHA were used as a Portland cement Type 1 replacement at the levels of 0%, 10%, 30%, and 50% by weight of binder. The water-to-binder ratios were 0.55 and 0.65. For the durability of mortar exposed to sulfate attack, 5% sodium sulfate (Na2SO4) and magnesium sulfate (MgSO4) solutions were used. As a result, when increasing the percentage replacement of BRHA, the expansion and compressive strength loss of mortar decreased. At the replacement levels of 30% and 50% of BRHA, the expansion of the mortars was less than those mixed with sulfate-resistant cement. However, the expansion of the mortars exposed to Na2SO4 was more than those exposed to MgSO4. Increasing the replacement level of BRHA tends to reduce the compressive strength loss of mortars exposed to Na2SO4 attack. In contrary, under MgSO4 attack, when increasing the replacement level of BRHA, the compressive strength loss increases from 0% to 50% in comparison to Portland cement mortar. Results show that ground BRHA can be applied as a pozzolanic material to concrete and also improve resistance to sodium sulfate attack, but it can impair resistance to magnesium sulfate attack.

  9. Assessment of Mechanical Properties and Damage of High Performance Concrete Subjected to Magnesium Sulfate Environment

    Directory of Open Access Journals (Sweden)

    Sheng Cang

    2017-01-01

    Full Text Available Sulfate attack is one of the most important problems affecting concrete structures, especially magnesium sulfate attack. This paper presents an investigation on the mechanical properties and damage evolution of high performance concrete (HPC with different contents of fly ash exposure to magnesium sulfate environment. The microstructure, porosity, mass loss, dimensional variation, compressive strength, and splitting tensile strength of HPC were investigated at various erosion times up to 392 days. The ultrasonic pulse velocity (UPV propagation in HPC at different erosion time was determined by using ultrasonic testing technique. A relationship between damage and UPV of HPC was derived according to damage mechanics, and a correlation between the damage of HPC and erosion time was obtained eventually. The results indicated that (1 the average increasing amplitude of porosity for HPCs was 34.01% before and after exposure to magnesium sulfate solution; (2 the damage evolution of HPCs under sulfate attack could be described by an exponential fitting; (3 HPC containing 20% fly ash had the strongest resistance to magnesium sulfate attack.

  10. Controlling Sulfate Attack in Mississippi Department of Transportation Structures

    Science.gov (United States)

    2010-08-01

    such as calcium aluminates and calcium hydroxide , can influence the degree of damage observed. In all cases, the deterioration observed appears to be...high levels of sulfate showed mineralogical evidence that calcium alumino-sulfate minerals such as ettringite were present in significant quantities...investigation, the Caltrans test was modified to adapt it to the available equipment. A description of the modified test procedure is given in Appendix B. A

  11. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  12. Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481

    International Nuclear Information System (INIS)

    Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S.; Flach, G.; Langton, C.; Smith, F.G.III; Burns, H.; Van der Sloot, H.; Meeussen, J.C.L.; Seignette, P.F.A.B.; Samson, E.; Mallick, P.; Suttora, L.; Esh, D.; Fuhrmann, M.; Philip, J.

    2013-01-01

    The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS TM /ORCHESTRA and STADIUM R , were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS TM /ORCHESTRA and STADIUM R models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation reactions with

  13. Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481

    Energy Technology Data Exchange (ETDEWEB)

    Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S. [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States); Flach, G.; Langton, C.; Smith, F.G.III; Burns, H. [Savannah River National Laboratory, Aiken, SC 29808 (United States); Van der Sloot, H. [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands); Meeussen, J.C.L. [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands); Seignette, P.F.A.B. [Energy Research Center of The Netherlands, Petten (Netherlands); Samson, E. [SIMCO Technologies, Inc., Quebec (Canada); Mallick, P.; Suttora, L. [U.S. Department of Energy, Washington, DC (United States); Esh, D.; Fuhrmann, M.; Philip, J. [U.S. Nuclear Regulatory Commission, Washington, DC (United States)

    2013-07-01

    The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R}, were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R} models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation

  14. Evaluating performance-based test and specifications for sulfate resistance in concrete

    Science.gov (United States)

    2000-12-01

    This research project involved an experimental evaluation of the sulfate resistance of various concretes and mortars for the purpose of establishing performance-based specifications for the durability of concrete against sulfate attack. The research ...

  15. Using Physical Context-Based Authentication against External Attacks: Models and Protocols

    Directory of Open Access Journals (Sweden)

    Wilson S. Melo

    2018-01-01

    Full Text Available Modern systems are increasingly dependent on the integration of physical processes and information technologies. This trend is remarkable in applications involving sensor networks, cyberphysical systems, and Internet of Things. Despite its complexity, such integration results in physical context information that can be used to improve security, especially authentication. In this paper, we show that entities sharing the same physical context can use it for establishing a secure communication channel and protecting each other against external attacks. We present such approach proposing a theoretical model for generating unique bitstreams. Two different protocols are suggested. Each one is evaluated using probabilistic analysis and simulation. In the end, we implement the authentication mechanism in a case study using networks radio signal as physical event generator. The results demonstrate the performance of each of the protocols and their suitability for applications in real world.

  16. Accelerated test for measuring sulfate resistance of hydraulic cements for Caltrans LLPRS program

    Science.gov (United States)

    2000-04-01

    Many California soils are rich in sulfates, which can have deleterious effects on the cements used in rigid pavements. Field experience has demonstrated that sulfate attack usually manifests itself in the form of loss of adhesion and strength. In ord...

  17. Dissolution of sulfate scales

    Energy Technology Data Exchange (ETDEWEB)

    Hen, J.

    1991-11-26

    This patent describes a composition for the removal of sulfate scale from surfaces. It comprises: an aqueous solution of about 0.1 to 1.0 molar concentration of an aminopolycarboxylic acid (APCA) containing 1 to 4 amino groups or a salt thereof, and about 0.1 to 1.0 molar concentration of a second component which is diethylenetriaminepenta (methylenephosphonic acid) (DTPMP) or a salt thereof, or aminotri (methylenephosphonic acid) (ATMP) or a salt thereof as an internal phase enveloped by a hydrocarbon membrane phase which is itself emulsified in an external aqueous phase, the hydrocarbon membrane phase continuing a complexing agent weaker for the cations of the sulfate scale than the APCA and DTPMP or ATMP, any complexing agent for the cations in the external aqueous phase being weaker than that in the hydrocarbon membrane phase.

  18. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  19. Pattern of external injuries sustained during bomb blast attacks in Karachi, Pakistan from 2000 to 2007.

    Science.gov (United States)

    Surani, Arif Anwar; Ali, Salman; Surani, Asif; Zahid, Sohaib; Shoukat, Akber; Varon, Joseph; Surani, Salim

    2015-07-01

    To evaluate patterns of external injury resulting from bomb blasts in Karachi, and compare the injury profile resulting from explosions in open versus semi-confined blast environments. The retrospective, cross-sectional study was conducted in Karachi and comprised relevant data from January 2000 to October 2007. Casualty medical records and medico-legal certificates of the victims presented to three large public-sector hospitals were evaluated using a self-designed proforma. SPSS 17 was used for statistical analysis. Of the 1146 victims, data of 481(42%) represented the final study sample. Of these, 306(63.6%) were injured in open spaces and 175(36.4%) in semi-confined spaces. Of the 896 recorded injuries, lacerations were encountered as external injury in 427(47.7%) cases, followed by penetrating wounds in 137(15.3%). Lower and upper extremities were injured in 348(38.8%) and 170(19%) victims respectively. Open and semi-confined blast environments produced specific injury pattern and profile (pbomb blast attacks in Karachi demonstrated specific injury patterns and profiles. Further studies are required to account for internal injuries and classification of injuries based on standardised scoring systems.

  20. Composite templates synthesis of mesoporous titania from industrial titanyl sulfate solution under external outfields

    International Nuclear Information System (INIS)

    Tian Congxue

    2008-01-01

    The precursors of mesoporous titania were synthesized via supra-molecular self-assembly route induced by composite templates (CTAB/P-123) from industrial titanyl sulfate solution under ultrasonic irradiation, microwave and hydrothermal condition. The hydrolysis and polycondensation rates of TiOSO 4 solution were controlled by adjusting the pH value at about 1.0. Mesoporous titania with anatase phase was obtained after templates removal by calcinations. The as-prepared powder was characterized by X-ray diffraction (XRD), N 2 isothermal adsorption-desorption, HRTEM and SAD. External outfields with enhancing polar action and soft hydrothermal condition were beneficial to prepare better mesoporous TiO 2 . Ultrasonic vibration promoted the formation of mesoporous structure. Under microwave irradiation, mesoporous TiO 2 was synthesized with BET specific surface area of 190.6 m 2 g -1 , average pore diameter of 2.57 nm and crystal size of 13.65 nm. And ultrasonic irradiation, microwave and hydrothermal conditions were making for forming and stabilizing the mesoporous structure

  1. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    International Nuclear Information System (INIS)

    Langton, C.

    2008-01-01

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM(reg s ign) code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM(reg s ign) code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is

  2. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  3. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  4. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  5. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  6. Degradation processes of reinforced concretes by combined sulfate–phosphate attack

    Energy Technology Data Exchange (ETDEWEB)

    Secco, Michele, E-mail: michele.secco@unipd.it [Inter-Departmental Research Center for the Study of Cement Materials and Hydraulic Binders (CIRCe), University of Padova, Via Gradenigo 6, 35131 Padova (Italy); Department of Civil, Environmental and Architectural Engineering (ICEA), University of Padova, Via Marzolo 9, 35131 Padova (Italy); Lampronti, Giulio Isacco, E-mail: gil21@cam.ac.uk [Department of Earth Sciences, University of Cambridge, Downing Street, CB2 3EQ Cambridge (United Kingdom); Schlegel, Moritz-Caspar, E-mail: moritz-caspar.schlegel@helmholtz-berlin.de [BAM Federal Institute for Materials Research and Testing, Unter den Eichen 87, 12205 Berlin (Germany); Helmholtz-Zentrum Berlin fürMaterialien und Energie GmbH, Hahn-Meitner-Platz 1, 14109 Berlin (Germany); Maritan, Lara, E-mail: lara.maritan@unipd.it [Department of Geosciences, University of Padova, Via Gradenigo 6, 35131 Padova (Italy); Zorzi, Federico, E-mail: federico.zorzi@unipd.it [Department of Geosciences, University of Padova, Via Gradenigo 6, 35131 Padova (Italy)

    2015-02-15

    A novel form of alteration due to the interaction between hydrated cement phases and sulfate and phosphate-based pollutants is described, through the characterization of concrete samples from an industrial reinforced concrete building. Decalcification of the cement matrices was observed, with secondary sulfate and phosphate-based mineral formation, according to a marked mineralogical and textural zoning. Five alteration layers may be detected: the two outermost layers are characterized by the presence of gypsum–brushite solid solution phases associated with anhydrous calcium sulfates and phosphates, respectively, while a progressive increase in apatite and ammonium magnesium phosphates is observable in the three innermost layers, associated with specific apatite precursors (brushite, octacalcium phosphate and amorphous calcium phosphate, respectively). The heterogeneous microstructural development of secondary phases is related to the chemical, pH and thermal gradients in the attacked cementitious systems, caused by different sources of pollutants and the exposure to the sun's radiation.

  7. Degradation processes of reinforced concretes by combined sulfate–phosphate attack

    International Nuclear Information System (INIS)

    Secco, Michele; Lampronti, Giulio Isacco; Schlegel, Moritz-Caspar; Maritan, Lara; Zorzi, Federico

    2015-01-01

    A novel form of alteration due to the interaction between hydrated cement phases and sulfate and phosphate-based pollutants is described, through the characterization of concrete samples from an industrial reinforced concrete building. Decalcification of the cement matrices was observed, with secondary sulfate and phosphate-based mineral formation, according to a marked mineralogical and textural zoning. Five alteration layers may be detected: the two outermost layers are characterized by the presence of gypsum–brushite solid solution phases associated with anhydrous calcium sulfates and phosphates, respectively, while a progressive increase in apatite and ammonium magnesium phosphates is observable in the three innermost layers, associated with specific apatite precursors (brushite, octacalcium phosphate and amorphous calcium phosphate, respectively). The heterogeneous microstructural development of secondary phases is related to the chemical, pH and thermal gradients in the attacked cementitious systems, caused by different sources of pollutants and the exposure to the sun's radiation

  8. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  9. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  10. Quantification and isotopic analysis of intracellular sulfur metabolites in the dissimilatory sulfate reduction pathway

    Science.gov (United States)

    Sim, Min Sub; Paris, Guillaume; Adkins, Jess F.; Orphan, Victoria J.; Sessions, Alex L.

    2017-06-01

    Microbial sulfate reduction exhibits a normal isotope effect, leaving unreacted sulfate enriched in 34S and producing sulfide that is depleted in 34S. However, the magnitude of sulfur isotope fractionation is quite variable. The resulting changes in sulfur isotope abundance have been used to trace microbial sulfate reduction in modern and ancient ecosystems, but the intracellular mechanism(s) underlying the wide range of fractionations remains unclear. Here we report the concentrations and isotopic ratios of sulfur metabolites in the dissimilatory sulfate reduction pathway of Desulfovibrio alaskensis. Intracellular sulfate and APS levels change depending on the growth phase, peaking at the end of exponential phase, while sulfite accumulates in the cell during stationary phase. During exponential growth, intracellular sulfate and APS are strongly enriched in 34S. The fractionation between internal and external sulfate is up to 49‰, while at the same time that between external sulfate and sulfide is just a few permil. We interpret this pattern to indicate that enzymatic fractionations remain large but the net fractionation between sulfate and sulfide is muted by the closed-system limitation of intracellular sulfate. This 'reservoir effect' diminishes upon cessation of exponential phase growth, allowing the expression of larger net sulfur isotope fractionations. Thus, the relative rates of sulfate exchange across the membrane versus intracellular sulfate reduction should govern the overall (net) fractionation that is expressed. A strong reservoir effect due to vigorous sulfate reduction might be responsible for the well-established inverse correlation between sulfur isotope fractionation and the cell-specific rate of sulfate reduction, while at the same time intraspecies differences in sulfate uptake and/or exchange rates could account for the significant scatter in this relationship. Our approach, together with ongoing investigations of the kinetic isotope

  11. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  12. Sulfate and sulfide sulfur isotopes (δ34S and δ33S) measured by solution and laser ablation MC-ICP-MS: An enhanced approach using external correction

    Science.gov (United States)

    Pribil, Michael; Ridley, William I.; Emsbo, Poul

    2015-01-01

    Isotope ratio measurements using a multi-collector inductively coupled plasma mass spectrometer (MC-ICP-MS) commonly use standard-sample bracketing with a single isotope standard for mass bias correction for elements with narrow-range isotope systems measured by MC-ICP-MS, e.g. Cu, Fe, Zn, and Hg. However, sulfur (S) isotopic composition (δ34S) in nature can range from at least − 40 to + 40‰, potentially exceeding the ability of standard-sample bracketing using a single sulfur isotope standard to accurately correct for mass bias. Isotopic fractionation via solution and laser ablation introduction was determined during sulfate sulfur (Ssulfate) isotope measurements. An external isotope calibration curve was constructed using in-house and National Institute of Standards and Technology (NIST) Ssulfate isotope reference materials (RM) in an attempt to correct for the difference. The ability of external isotope correction for Ssulfate isotope measurements was evaluated by analyzing NIST and United States Geological Survey (USGS) Ssulfate isotope reference materials as unknowns. Differences in δ34Ssulfate between standard-sample bracketing and standard-sample bracketing with external isotope correction for sulfate samples ranged from 0.72‰ to 2.35‰ over a δ34S range of 1.40‰ to 21.17‰. No isotopic differences were observed when analyzing Ssulfide reference materials over a δ34Ssulfide range of − 32.1‰ to 17.3‰ and a δ33S range of − 16.5‰ to 8.9‰ via laser ablation (LA)-MC-ICP-MS. Here, we identify a possible plasma induced fractionation for Ssulfate and describe a new method using external isotope calibration corrections using solution and LA-MC-ICP-MS.

  13. Effect of sodium sulphate attack on the resistance to flexion, formation of expansive compounds and microcracking in cement paste; Efeito do ataque por sulfato de sodio na resistencia a flexao, formacao de compostos expansivos e microfissuracao de pastas de cimento

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Rui Barbosa de; John, Vanderlei Moacyr; Cincotto, Maria Alba [Universidade de Sao Paulo (USP), SP (Brazil). Escola Politecnica], e-mail: rui.souza@poli.usp.br, e-mail: vanderley.john@poli.usp.br, e-mail: maria.cincotto@poli.usp.br; Simao, Cristina Aiex [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia de Tecnologia e Engenharia de Poco], e-mail: caies@petrobras.com.br

    2008-06-15

    The main objective of this research is to study the common methods for evaluating cement reactivity to sulfate attack. Resistance to sulfate attack was measured by determining the flexural strength in cement paste samples with exposure to Na{sub 2}SO{sub 4} solution (45,426 ppm of SO{sub 4}{sup 2-}), at a high temperature (55 deg C). The results of flexural strength showed that the resistance increases due to the attack because the products fill the pores. (author)

  14. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  15. Euglena mitochondria and chloroplasts form tyrosine-O-sulfate

    Energy Technology Data Exchange (ETDEWEB)

    Saidha, T.; Hanfstingl, U.; Schiff, J.A. (Brandeis Univ., Waltham, MA (USA))

    1989-04-01

    Mitochondria from light-grown wild-type Euglena gracilis var. bacillaris Cori or dark-grown mutant W{sub 10}BSmL incubated with {sup 35}SO{sub 4}{sup 2{minus}} and ATP, or with {sup 14}C-tyrosine, non-radioactive sulfate and ATP accumulate a labeled compound in the medium. Since this compound shows exact coelectrophoresis with tyrosine-O-sulfate (TOS) at pH 2.0, 5.8 or 8.0., yields sulfate and tyrosine on acid hydrolysis, and treatment with aryl sulfatase from Aerobacter aerogenes yields sulfate and tyrosine but no tyrosine methyl ester, it is identified as TOS. No TOS is found outside purified developing chloroplasts incubated with {sup 35}SO{sub 4}{sup 2{minus}} and ATP, but both chloroplasts and mitochondria form to {sup 35}S externally when incubated with adenosine 3{prime} phosphate 5{prime}phospho({sup 35}S) sulfate (PAP{sup 35}S). Since no tyrosine need be added, tyrosine is provided from endogenous sources. Although TOS is found in the free pool of Euglena cells it cannot be detected in proteins of cells or mucus ruling our sulfation of tyrosine of protein or incorporation of TOS into proteins. The system forming TOS is membrane-bound and may be involved in tyrosine transport.

  16. Surface Corrosion and Microstructure Degradation of Calcium Sulfoaluminate Cement Subjected to Wet-Dry Cycles in Sulfate Solution

    Directory of Open Access Journals (Sweden)

    Wuman Zhang

    2017-01-01

    Full Text Available The hydration products of calcium sulfoaluminate (CSA cement are different from those of Portland cement. The degradation of CSA cement subjected to wet-dry cycles in sulfate solution was studied in this paper. The surface corrosion was recorded and the microstructures were examined by scanning electron microscopy (SEM. The results show that SO42-, Na+, Mg2+, and Cl− have an effect on the stability of ettringite. In the initial period of sulfate attack, salt crystallization is the main factor leading to the degradation of CSA cement specimens. The decomposition and the carbonation of ettringite will cause long-term degradation of CSA cement specimens under wet-dry cycles in sulfate solution. The surface spalling and microstructure degradation increase significantly with the increase of wet-dry cycles, sulfate concentration, and water to cement ratio. Magnesium sulfate and sodium chloride reduce the degradation when the concentration of sulfate ions is a constant value.

  17. 49 CFR 193.2629 - External corrosion control: buried or submerged components.

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES: FEDERAL SAFETY STANDARDS Maintenance § 193.2629 External... external corrosive attack must be protected from external corrosion by— (1) Material that has been designed...

  18. Sulfation of chondroitin. Specificity, degree of sulfation, and detergent effects with 4-sulfating and 6-sulfating microsomal systems

    International Nuclear Information System (INIS)

    Sugumaran, G.; Silbert, J.E.

    1988-01-01

    Microsomal preparations from chondroitin 6-sulfate-producing chick embryo epiphyseal cartilage, and from chondroitin 4-sulfate-producing mouse mastocytoma cells, were incubated with UDP-[14C]glucuronic acid and UDP-N-acetylgalactosamine to form non-sulfated proteo[14C]chondroitin. Aliquots of the incubations were then incubated with 3'-phosphoadenylylphosphosulfate (PAPS) in the presence or absence of various detergents. In the absence of detergents, there was good sulfation of this endogenous proteo[14C]chondroitin by the original microsomes from both sources. Detergents, with the exception of Triton X-100, markedly inhibited sulfation in the mast cell system but not in the chick cartilage system. These results indicate that sulfation and polymerization are closely linked on cell membranes and that in some cases this organization can be disrupted by detergents. When aliquots of the original incubation were heat inactivated, and then reincubated with new microsomes from chick cartilage and/or mouse mastocytoma cells plus PAPS, there was no significant sulfation of this exogenous proteo[14C] chondroitin with either system unless Triton X-100 was added. Sulfation of exogenous chondroitin and chondroitin hexasaccharide was compared with sulfation of endogenous and exogenous proteo[14C]chondroitin. Sulfate incorporation into hexasaccharide and chondroitin decreased as their concentrations (based on uronic acid) approached that of the proteo[14C]chondroitin. At the same time, the degree of sulfation in percent of substituted hexosamine increased. However, the degree of sulfation did not reach that of the endogenous proteo[14C]chondroitin. Hexasaccharide and chondroitin sulfation were stimulated by the presence of Triton X-100. However, in contrast to the exogenous proteo[14C]chondroitin, there was some sulfation of hexasaccharide and chondroitin in the absence of this detergent

  19. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2011-01-01

    There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec

  20. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2012-01-01

    Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest

  1. Blood flow velocity in migraine attacks - a transcranial Doppler study

    International Nuclear Information System (INIS)

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D.

    1991-01-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs

  2. Blood flow velocity in migraine attacks - a transcranial Doppler study

    Energy Technology Data Exchange (ETDEWEB)

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D. (Rijksuniversiteit Leiden (Netherlands))

    1991-05-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs.

  3. Sulfate metabolism. I. Sulfate uptake and redistribution of acid rain sulfate by edible plants

    International Nuclear Information System (INIS)

    Dallam, R.D.

    1987-01-01

    Sulfur is the major component of polluted air in industrialized societies. Atmospheric sulfur is converted to sulfuric acid through a series of chemical reactions which can eventually reenter many ecosystems. When edible plants are grown in soils containing varying amounts of sulfate, the roots take up and transport inorganic sulfate to the stems and leaves. The sulfate taken up by the roots and the amount transported to the stem and leaves was found to be a function of the concentration of sulfate in the soil. Inorganic sulfate taken up by a corn plant seedling can be rapidly converted to organic sulfate by the root system. Nine days after one of a pair of pea plants was inoculated with artificial acid rain sulfate (dilute H 2 35 SO 4 ) it was found that the sulfate was translocated not only in the inoculated plant, but also to the uninoculated pea plant in the same container. Also, when the leaves of a mature potato plant were inoculated with artificial acid rain sulfate it was found that the sulfate was translocated into the edible potatoes. Fractionation of the potatoes showed that most of the sulfate was water soluble of which 30% was inorganic sulfate and 70% was in the form of organic sulfur. One third of the non-water soluble translocated acid rain sulfate was equally divided between lipid and non-lipid organic sulfur of the potato. 9 references, 2 figures, 5 tables

  4. The influence of different black carbon and sulfate mixing methods on their optical and radiative properties

    Science.gov (United States)

    Zhang, Hua; Zhou, Chen; Wang, Zhili; Zhao, Shuyun; Li, Jiangnan

    2015-08-01

    Three different internal mixing methods (Core-Shell, Maxwell-Garnett, and Bruggeman) and one external mixing method are used to study the impact of mixing methods of black carbon (BC) with sulfate aerosol on their optical properties, radiative flux, and heating rate. The optical properties of a mixture of BC and sulfate aerosol particles are considered for three typical bands. The results show that mixing methods, the volume ratio of BC to sulfate, and relative humidity have a strong influence on the optical properties of mixed aerosols. Compared to internal mixing, external mixing underestimates the particle mass absorption coefficient by 20-70% and the particle mass scattering coefficient by up to 50%, whereas it overestimates the particle single scattering albedo by 20-50% in most cases. However, the asymmetry parameter is strongly sensitive to the equivalent particle radius, but is only weakly sensitive to the different mixing methods. Of the internal methods, there is less than 2% difference in all optical properties between the Maxwell-Garnett and Bruggeman methods in all bands; however, the differences between the Core-Shell and Maxwell-Garnett/Bruggeman methods are usually larger than 15% in the ultraviolet and visible bands. A sensitivity test is conducted with the Beijing Climate Center Radiation transfer model (BCC-RAD) using a simulated BC concentration that is typical of east-central China and a sulfate volume ratio of 75%. The results show that the internal mixing methods could reduce the radiative flux more effectively because they produce a higher absorption. The annual mean instantaneous radiative force due to BC-sulfate aerosol is about -3.18 W/m2 for the external method and -6.91 W/m2 for the internal methods at the surface, and -3.03/-1.56/-1.85 W/m2 for the external/Core-Shell/(Maxwell-Garnett/Bruggeman) methods, respectively, at the tropopause.

  5. How to Distinguish Attacks by the Black Turpentine Beetle and Dioryctria Amatella on Southern Pines

    Science.gov (United States)

    Carl W. Fatzinger; Gary L. DeBarr

    1969-01-01

    Trunk attacks by the black turpentine beetle, Dendroctonus terebrans (Oh.), and the larvae of Dioryctria amatella (Hulst) on the southern pines results in a copious flow of pitch. This external pitch mass or pitch tube exhibits characteristics that can be used as symptoms to distinguish between attacks by these two insects.

  6. Shoulder-Rotator Strength, Range of Motion, and Acromiohumeral Distance in Asymptomatic Adolescent Volleyball Attackers.

    Science.gov (United States)

    Harput, Gulcan; Guney, Hande; Toprak, Ugur; Kaya, Tunca; Colakoglu, Fatma Filiz; Baltaci, Gul

    2016-09-01

    Sport-specific adaptations at the glenohumeral joint could occur in adolescent athletes because they start participating in high-performance sports in early childhood. To investigate shoulder-rotator strength, internal-rotation (IR) and external-rotation (ER) range of motion (ROM), and acromiohumeral distance (AHD) in asymptomatic adolescent volleyball attackers to determine if they have risk factors for injury. Cross-sectional study. University laboratory. Thirty-nine adolescent high school-aged volleyball attackers (22 boys, 17 girls; age = 16.0 ± 1.4 years, height = 179.2 ± 9.0 cm, mass = 67.1 ± 10.9 kg, body mass index = 20.7 ± 2.6 kg/m 2 ). Shoulder IR and ER ROM, total-rotation ROM, glenohumeral IR deficit, AHD, and concentric and eccentric strength of the shoulder internal and external rotators were tested bilaterally. External-rotation ROM was greater (t 38 = 4.92, P 18°). We observed greater concentric internal-rotator (t 38 = 2.89, P = .006) and eccentric external-rotator (t 38 = 2.65, P = .01) strength in the dominant than in the nondominant shoulder. The AHD was less in the dominant shoulder (t 38 = -3.60, P volleyball attackers demonstrated decreased IR ROM, total ROM, and AHD and increased ER ROM in their dominant shoulder. Therefore, routine screening of adolescent athletes and designing training programs for hazardous adaptive changes could be important in preventing shoulder injuries.

  7. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  8. Sulfate Transporters in Dissimilatory Sulfate Reducing Microorganisms: A Comparative Genomics Analysis

    Directory of Open Access Journals (Sweden)

    Angeliki Marietou

    2018-03-01

    Full Text Available The first step in the sulfate reduction pathway is the transport of sulfate across the cell membrane. This uptake has a major effect on sulfate reduction rates. Much of the information available on sulfate transport was obtained by studies on assimilatory sulfate reduction, where sulfate transporters were identified among several types of protein families. Despite our growing knowledge on the physiology of dissimilatory sulfate-reducing microorganisms (SRM there are no studies identifying the proteins involved in sulfate uptake in members of this ecologically important group of anaerobes. We surveyed the complete genomes of 44 sulfate-reducing bacteria and archaea across six phyla and identified putative sulfate transporter encoding genes from four out of the five surveyed protein families based on homology. We did not find evidence that ABC-type transporters (SulT are involved in the uptake of sulfate in SRM. We speculate that members of the CysP sulfate transporters could play a key role in the uptake of sulfate in thermophilic SRM. Putative CysZ-type sulfate transporters were present in all genomes examined suggesting that this overlooked group of sulfate transporters might play a role in sulfate transport in dissimilatory sulfate reducers alongside SulP. Our in silico analysis highlights several targets for further molecular studies in order to understand this key step in the metabolism of SRMs.

  9. Characterization and application of automated in-vacuum PIXE/EBS system for direct analysis of chloride and sulfate ions attack in cementitious materials

    Science.gov (United States)

    Rihawy, M. S.; Alwazzeh, M.; Abbas, K.

    2018-01-01

    Ion beam analysis (IBA) techniques (Particle Induced X-ray Emission, PIXE and Elastic Backscattering Spectrometry, EBS), were applied to investigate chloride and sulfate ions diffusion into laboratory prepared mortar samples. Development and characterization of an automated in-vacuum macro PIXE/EBS system is thoroughly discussed. Depth profile information of both chloride and sulfate ions in laboratory prepared mortar samples, after immersion in sea water for nine months, was rapidly and easily obtained at fairly low cost and with standardless analysis, demonstrating the value of the application of IBA to elemental depth profiling in cementitious materials. Chloride and sulfate depth profiles were obtained for two sets of mortar samples, one prepared with different water/cement (W/C) ratios and the other with different sand/cement (S/C) ratios. Results showed higher diffusion rates of both chloride and sulfate ions when both ratios are increased. Additionally, the W/C ratio has a stronger influence in both sulfate and chloride penetration than the S/C ratio, and chloride ions penetrate faster than sulfates. Advantages and limitations of applying IBA techniques in this investigation are discussed. The comparison between PIXE and other X-ray based analytical techniques, namely X-ray fluorescence (XRF) and energy and wavelength dispersive X-rays (EDX/WDX), as well as other traditional wet chemical methods is reviewed, and industrial applications are discussed.

  10. Enhanced sulfate reduction with acidogenic sulfate-reducing bacteria

    International Nuclear Information System (INIS)

    Wang Aijie; Ren Nanqi; Wang Xu; Lee Duujong

    2008-01-01

    Sulfate reduction in a continuous flow, acidogenic reactor using molasses wastewater as the carbon source was studied at varying chemical oxygen demand/sulfate (COD/SO 4 2- ) ratios. At a critical COD/SO 4 2- ratio of 2.7, neither COD nor sulfate were in excess for extra production of ethanol or acetate in the reactor. An acetic-type microbial metabolism was established with sulfate-reducing bacteria (SRB) significantly consuming hydrogen and volatile fatty acids produced by acidogenic bacteria and hydrogen producing acetogens in degrading COD, thereby yielding sulfate removal rate >94.6%. A low critical COD/SO 4 2- ratio of 1.6 was also observed with the enriched ASRB population in reactor which overcomes the barrier to the treatment capability of sulfate-laden wastewater treatment with limited COD supply

  11. Reduced sulfation of chondroitin sulfate but not heparan sulfate in kidneys of diabetic db/db mice.

    Science.gov (United States)

    Reine, Trine M; Grøndahl, Frøy; Jenssen, Trond G; Hadler-Olsen, Elin; Prydz, Kristian; Kolset, Svein O

    2013-08-01

    Heparan sulfate proteoglycans are hypothesized to contribute to the filtration barrier in kidney glomeruli and the glycocalyx of endothelial cells. To investigate potential changes in proteoglycans in diabetic kidney, we isolated glycosaminoglycans from kidney cortex from healthy db/+ and diabetic db/db mice. Disaccharide analysis of chondroitin sulfate revealed a significant decrease in the 4-O-sulfated disaccharides (D0a4) from 65% to 40%, whereas 6-O-sulfated disaccharides (D0a6) were reduced from 11% to 6%, with a corresponding increase in unsulfated disaccharides. In contrast, no structural differences were observed in heparan sulfate. Furthermore, no difference was found in the molar amount of glycosaminoglycans, or in the ratio of hyaluronan/heparan sulfate/chondroitin sulfate. Immunohistochemical staining for the heparan sulfate proteoglycan perlecan was similar in both types of material but reduced staining of 4-O-sulfated chondroitin and dermatan was observed in kidney sections from diabetic mice. In support of this, using qRT-PCR, a 53.5% decrease in the expression level of Chst-11 (chondroitin 4-O sulfotransferase) was demonstrated in diabetic kidney. These results suggest that changes in the sulfation of chondroitin need to be addressed in future studies on proteoglycans and kidney function in diabetes.

  12. Semi-synthesis of chondroitin sulfate-E from chondroitin sulfate-A

    OpenAIRE

    Cai, Chao; Solakyildirim, Kemal; Yang, Bo; Beaudet, Julie M.; Weyer, Amanda; Linhardt, Robert J.; Zhang, Fuming

    2012-01-01

    Chondroitin sulfate-E (chondroitin-4, 6-disulfate) was prepared from chondroitin sulfate-A (chondroitin-4 - sulfate) by regioselective sulfonation, performed using trimethylamine sulfur trioxide in formamide under argon. The structure of semi-synthetic chondroitin sulfate-E was analyzed by PAGE, 1H NMR, 13C NMR, 2D NMR and disaccharide analysis and compared with natural chondroitin sulfate-E. Both semi-synthetic and natural chondroitin sulfate-E were each biotinylated and immobilized on BIAco...

  13. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  14. Microbial fuel cell based on electroactive sulfate-reducing biofilm

    International Nuclear Information System (INIS)

    Angelov, Anatoliy; Bratkova, Svetlana; Loukanov, Alexandre

    2013-01-01

    Highlights: ► Regulation and management of electricity generation by variation of residence time. ► Design of microbial fuel cell based on electroactive biofilm on zeolite. ► Engineering solution for removing of the obtained elemental sulfur. - abstract: A two chambered laboratory scale microbial fuel cell (MFC) has been developed, based on natural sulfate-reducing bacterium consortium in electroactive biofilm on zeolite. The MFC utilizes potassium ferricyanide in the cathode chamber as an electron acceptor that derives electrons from the obtained in anode chamber H 2 S. The molecular oxygen is finally used as a terminal electron acceptor at cathode compartment. The generated power density was 0.68 W m −2 with current density of 3.2 A m −2 at 150 Ω electrode resistivity. The hydrogen sulfide itself is produced by microbial dissimilative sulfate reduction process by utilizing various organic substrates. Finally, elemental sulfur was identified as the predominant final oxidation product in the anode chamber. It was removed from MFC through medium circulation and gathering in an external tank. This report reveals dependence relationship between the progress of general electrochemical parameters and bacterial sulfate-reduction rate. The presented MFC design can be used for simultaneous sulfate purification of mining drainage wastewater and generation of renewable electricity

  15. The influence of different black carbon and sulfate mixing methods on their optical and radiative properties

    International Nuclear Information System (INIS)

    Zhang, Hua; Zhou, Chen; Wang, Zhili; Zhao, Shuyun; Li, Jiangnan

    2015-01-01

    Three different internal mixing methods (Core–Shell, Maxwell-Garnett, and Bruggeman) and one external mixing method are used to study the impact of mixing methods of black carbon (BC) with sulfate aerosol on their optical properties, radiative flux, and heating rate. The optical properties of a mixture of BC and sulfate aerosol particles are considered for three typical bands. The results show that mixing methods, the volume ratio of BC to sulfate, and relative humidity have a strong influence on the optical properties of mixed aerosols. Compared to internal mixing, external mixing underestimates the particle mass absorption coefficient by 20–70% and the particle mass scattering coefficient by up to 50%, whereas it overestimates the particle single scattering albedo by 20–50% in most cases. However, the asymmetry parameter is strongly sensitive to the equivalent particle radius, but is only weakly sensitive to the different mixing methods. Of the internal methods, there is less than 2% difference in all optical properties between the Maxwell-Garnett and Bruggeman methods in all bands; however, the differences between the Core–Shell and Maxwell-Garnett/Bruggeman methods are usually larger than 15% in the ultraviolet and visible bands. A sensitivity test is conducted with the Beijing Climate Center Radiation transfer model (BCC-RAD) using a simulated BC concentration that is typical of east-central China and a sulfate volume ratio of 75%. The results show that the internal mixing methods could reduce the radiative flux more effectively because they produce a higher absorption. The annual mean instantaneous radiative force due to BC–sulfate aerosol is about –3.18 W/m 2 for the external method and –6.91 W/m 2 for the internal methods at the surface, and –3.03/–1.56/–1.85 W/m 2 for the external/Core–Shell/(Maxwell-Garnett/Bruggeman) methods, respectively, at the tropopause. - Highlights: • The aerosol optical properties with different mixing

  16. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  17. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  18. Pipe Lines – External Corrosion

    Directory of Open Access Journals (Sweden)

    Dan Babor

    2008-01-01

    Full Text Available Two areas of corrosion occur in pipe lines: corrosion from the medium carried inside the pipes; corrosion attack upon the outside of the pipes (underground corrosion. Electrolytic processes are also involved in underground corrosion. Here the moisture content of the soil acts as an electrolyte, and the ions required to conduct the current are supplied by water-soluble salts (chlorides, sulfates, etc. present in the soil. The nature and amount of these soluble materials can vary within a wide range, which is seen from the varying electrical conductivity and pH (varies between 3 and 10. Therefore the characteristics of a soil will be an important factor in under-ground corrosion.

  19. Amn al-Kharji: An Analysis of External Operations Wing of the Islamic State

    Directory of Open Access Journals (Sweden)

    Jakub Rafay

    2017-06-01

    Full Text Available This article provides an analysis of the external operations wing of IS –the so-called Amn al-Kharji – focusing on its activities in the West. Apart from describing the organisation’s leadership, internal hierarchy, strategy and means of communication and attack coordination, the author asserts there is a link between recent deadly cells-based attacks and generally unsuccessful lone actor attacks; this connection between the two is not accidental but a result of a grand strategy, designed to hide the planning of larger plots by overloading security services with numerous smaller attacks.

  20. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  1. Sulfate adsorption on goethite

    Energy Technology Data Exchange (ETDEWEB)

    Rietra, R P.J.J.; Hiemstra, T; Riemsdijk, W.H. van

    1999-10-15

    Recent spectroscopic work has suggested that only one surface species of sulfate is dominant on hematite. Sulfate is therefore a very suitable anion to test and develop adsorption models for variable charge minerals. The authors have studied sulfate adsorption on goethite covering a large range of sulfate concentrations, surface coverages, pH values, and electrolyte concentrations. Four different techniques were used to cover the entire range of conditions. For characterization at low sulfate concentrations, below the detection limit of sulfate with ICP-AES, the authors used proton-sulfate titrations at constant pH. Adsorption isotherms were studied for the intermediate sulfate concentration range. Acid-base titrations in sodium sulfate and electromobility were used for high sulfate concentrations. All the data can be modeled with one adsorbed species if it is assumed that the charge of adsorbed sulfate is spatially distributed in the interface. The charge distribution of sulfate follows directly from modeling the proton-sulfate adsorption stoichoimemtry sine this stoichiometry is independent of the intrinsic affinity constant of sulfate. The charge distribution can be related to the structure of the surface complex by use of the Pauling bond valence concept and is in accordance with the microscopic structure found by spectroscopy. The intrinsic affinity constant follows from the other measurements. Modeling of the proton-ion stoichoimetry with the commonly used 2-pK models, where adsorbed ions are treated as point charges, is possible only if at least two surface species for sulfate are used.

  2. Cyber-Attacks and the Risks for CERN

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In the previous Bulletin, we discussed the cyber-risks for the accelerator complex. However, looking at the broader picture, the cyber-risks for CERN are much more diverse.   Attacks can not only harm the operation of accelerators or experiments, but also impact negatively on the operation of the Organization as a whole and/or its reputation. This would not only hamper and impede our work while making us looking plain stupid, but might also make funding agencies reconsider whether their money is well invested in CERN… Examples? Sure, let’s be imaginative! What would be the consequences, if: a laptop holding sensitive CERN documents is lost or stolen, and ends up on eBay? your password is compromised and your mail account misused to send nasty messages to thousands of external mail addresses? an attacker manages to add photos of naked women/men onto a prominent CERN website, and boasts about this on Twitter? confidential documents like job application forms or passwo...

  3. Periodate Oxidation for Sulfated Glycosaminoglycans, with Special Reference to the Position of Extra Sulfate Groups in Chondroitin Polysulfates, Chondroitin Sulfate D and Chondroitin Sulfate K

    OpenAIRE

    Seno, Nobuko; Murakami, Keiko; Shibusawa, Haru

    1981-01-01

    The optimum conditions for periodate oxidation of sulfated disaccharides were investigated to determine the position of extra sulfate groups on the saturated disulfated disaccharides obtained from chondroitin polysulfates, chondroitin sulfates D and K. Under the conditions: 2mM saturated disulfated disaccharide with 20mM sodium periodate at 37°in the dark, the uronic acid residue in the disulfated disaccharide from chondroitin sulfate D was rapidly and completely destroyed, whereas that in th...

  4. Corrosion of 2205 Duplex Stainless Steel Weldment in Chloride Medium Containing Sulfate-Reducing Bacteria

    Science.gov (United States)

    Antony, P. J.; Singh Raman, R. K.; Kumar, Pradeep; Raman, R.

    2008-11-01

    Influence of changes in microstructure caused due to welding on microbiologically influenced corrosion of a duplex stainless steel was studied by exposing the weldment and parent metal to chloride medium containing sulfate-reducing bacteria (SRB). Identically prepared coupons (same area and surface finish) exposed to sterile medium were used as the control. Etching-type attack was observed in the presence of SRB, which was predominant in the heat-affected zone (HAZ) of the weldment. The anodic polarization studies indicated an increase in current density for coupon exposed to SRB-containing medium as compared to that obtained for coupon exposed to sterile medium. The scanning electron microscopy (SEM) observations after anodic polarization revealed that the attack was preferentially in the ferrite phase of HAZ of the weldment, whereas it was restricted to the austenite phase of the parent metal.

  5. Electrogenic sulfate uptake by crustacean hepatopancreatic basolateral membrane vesicles

    International Nuclear Information System (INIS)

    Cattey, M.A.; Gerencser, G.A.; Aheam, G.A.

    1990-01-01

    Basolateral membrane vesicles (BLMV) were isolated from Atlantic lobster (Homarus americanus) hepatopancreas and purified by discontinuous sucrose gradient centrifugation. BLMV prepared in this fashion were osmotically reactive exhibiting linear dependence of vesicular 35 SO 4 -2 uptake to increasing external osmotic pressure with negligible non-specific isotope binding. Under short circuited conditions (valinomycin/K + ) BLMV responded to either a HCO 3 - gradient directed out or equilibrated HCO 3 - (10 mM) by displaying short term accumulation of sulfate above that of equilibrium. Uptake of divalent anion was unaffected by an inwardly directed transmembrane Na + or tetramethylammonium + gradient. 35 SO 4 -2 /HCO 3 - exchange in the presence of valinomycin was stimulated by transient inside positive K + diffusion potentials and inhibited by transient inside negative K + diffusion potentials. The role of electrogenic anion exchange by hepatopancreas BLMV in transcellular sulfate transport is discussed

  6. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  7. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  8. Significant role of organic sulfur in supporting sedimentary sulfate reduction in low-sulfate environments

    Science.gov (United States)

    Fakhraee, Mojtaba; Li, Jiying; Katsev, Sergei

    2017-09-01

    Dissimilatory sulfate reduction (DSR) is a major carbon mineralization pathway in aquatic sediments, soils, and groundwater, which regulates the production of hydrogen sulfide and the mobilization rates of biologically important elements such as phosphorus and mercury. It has been widely assumed that water-column sulfate is the main sulfur source to fuel this reaction in sediments. While this assumption may be justified in high-sulfate environments such as modern seawater, we argue that in low-sulfate environments mineralization of organic sulfur compounds can be an important source of sulfate. Using a reaction-transport model, we investigate the production of sulfate from sulfur-containing organic matter for a range of environments. The results show that in low sulfate environments (50%) of sulfate reduction. In well-oxygenated systems, porewater sulfate profiles often exhibit sub-interface peaks so that sulfate fluxes are directed out of the sediment. Our measurements in Lake Superior, the world's largest lake, corroborate this conclusion: offshore sediments act as sources rather than sinks of sulfate for the water column, and sediment DSR is supported entirely by the in-sediment production of sulfate. Sulfate reduction rates are correlated to the depth of oxygen penetration and strongly regulated by the supply of reactive organic matter; rate co-regulation by sulfate availability becomes appreciable below 500 μM level. The results indicate the need to consider the mineralization of organic sulfur in the biogeochemical cycling in low-sulfate environments, including several of the world's largest freshwater bodies, deep subsurface, and possibly the sulfate-poor oceans of the Early Earth.

  9. Salt Attack on Rocks and Expansion of Soils on Mars

    Science.gov (United States)

    Vaniman, D. T.; Bish, D. L.; Chipera, S. J.; Carey, J. W.

    2004-12-01

    Salt-rich sediments observed by the MER rover Opportunity at Meridiani Planum show that brines have been present on Mars in the past, but a role for groundwater in widespread rock weathering and soil formation is uncertain. Experiments by several groups suggest instead the action of acid fog over long time spans, with episodic input of volcanic gases, as a more significant agent of Mars weathering. Salt minerals formed in these acid weathering experiments consistently include gypsum and alunogen, with epsomite or hexahydrite forming where olivine provides a source of Mg. Analogous to the martian acid fog scenario are terrestrial acid rain or acid fog attacks on building and monument stone by chemical action and mechanical wedging through growth of gypsum, anhydrite, epsomite, hexahydrite, kieserite, and other sulfate minerals. Physical effects can be aggressive, operating by both primary salt growth and hydration of anhydrous or less-hydrous primary salts. In contrast, soils evolve to states where chemical attack is lessened and salt mineral growth leads to expansion with cementation; in this situation the process becomes constructive rather than destructive. We have made synthetic salt-cemented soils (duricrusts) from clays, zeolites, palagonites and other media mixed with ultrapure Mg-sulfate solutions. Although near-neutral in pH, these solutions still exchange or leach Ca from the solids to form cements containing gypsum as well as hexahydrite. At low total P (1 torr) and low RH (duricrust expands by formation of a complex mixture of Mg-sulfate phases with various hydration states. The expanded form is retained even if the duricrust is again dehydrated, suggesting that soil porosity thus formed is difficult to destroy. These processes can be considered in the context of Viking, Pathfinder, and MER evidence for differing salt components in the weathered surfaces of rocks versus duricrust-like materials in soils. The divergent chemical trends indicate that soil

  10. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  11. Synthesis of the oligosaccharides related to branching sites of fucosylated chondroitin sulfates from sea cucumbers.

    Science.gov (United States)

    Ustyuzhanina, Nadezhda E; Fomitskaya, Polina A; Gerbst, Alexey G; Dmitrenok, Andrey S; Nifantiev, Nikolay E

    2015-02-02

    Natural anionic polysaccharides fucosylated chondroitin sulfates (FCS) from sea cucumbers attract great attention nowadays due to their ability to influence various biological processes, such as blood coagulation, thrombosis, angiogenesis, inflammation, bacterial and viral adhesion. To determine pharmacophore fragments in FCS we have started systematic synthesis of oligosaccharides with well-defined structure related to various fragments of these polysaccharides. In this communication, the synthesis of non-sulfated and selectively O-sulfated di- and trisaccharides structurally related to branching sites of FCS is described. The target compounds are built up of propyl β-d-glucuronic acid residue bearing at O-3 α-l-fucosyl or α-l-fucosyl-(1→3)-α-l-fucosyl substituents. O-Sulfation pattern in the fucose units of the synthetic targets was selected according to the known to date holothurian FCS structures. Stereospecific α-glycoside bond formation was achieved using 2-O-benzyl-3,4-di-O-chloroacetyl-α-l-fucosyl trichloroacetimidate as a donor. Stereochemical outcome of the glycosylation was explained by the remote participation of the chloroacetyl groups with the formation of the stabilized glycosyl cations, which could be attacked by the glycosyl acceptor only from the α-side. The experimental results were in good agreement with the SCF/MP2 calculated energies of such participation. The synthesized oligosaccharides are regarded as model compounds for the determination of a structure-activity relationship in FCS.

  12. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  13. Brittlestars contain highly sulfated chondroitin sulfates/dermatan sulfates that promote fibroblast growth factor 2-induced cell signaling.

    Science.gov (United States)

    Ramachandra, Rashmi; Namburi, Ramesh B; Ortega-Martinez, Olga; Shi, Xiaofeng; Zaia, Joseph; Dupont, Sam T; Thorndyke, Michael C; Lindahl, Ulf; Spillmann, Dorothe

    2014-02-01

    Glycosaminoglycans (GAGs) isolated from brittlestars, Echinodermata class Ophiuroidea, were characterized, as part of attempts to understand the evolutionary development of these polysaccharides. A population of chondroitin sulfate/dermatan sulfate (CS/DS) chains with a high overall degree of sulfation and hexuronate epimerization was the major GAG found, whereas heparan sulfate (HS) was below detection level. Enzymatic digestion with different chondroitin lyases revealed exceptionally high proportions of di- and trisulfated CS/DS disaccharides. The latter unit appears much more abundant in one of four individual species of brittlestars, Amphiura filiformis, than reported earlier in other marine invertebrates. The brittlestar CS/DS was further shown to bind to growth factors such as fibroblast growth factor 2 and to promote FGF-stimulated cell signaling in GAG-deficient cell lines in a manner similar to that of heparin. These findings point to a potential biological role for the highly sulfated invertebrate GAGs, similar to those ascribed to HS in vertebrates.

  14. Discovery of a Heparan sulfate 3- o -sulfation specific peeling reaction

    NARCIS (Netherlands)

    Huang, Yu; Mao, Yang; Zong, Chengli; Lin, Cheng; Boons, Geert Jan|info:eu-repo/dai/nl/088245489; Zaia, Joseph

    2015-01-01

    Heparan sulfate (HS) 3-O-sulfation determines the binding specificity of HS/heparin for antithrombin III and plays a key role in herpes simplex virus (HSV) infection. However, the low natural abundance of HS 3-O-sulfation poses a serious challenge for functional studies other than the two cases

  15. p-Cresyl sulfate and indoxyl sulfate in pediatric patients on chronic dialysis

    Directory of Open Access Journals (Sweden)

    Hye Sun Hyun

    2013-04-01

    Full Text Available <b>Purpose:</b> Indoxyl sulfate and p- cresyl sulfate are important protein-bound uremic retention solutes whose levels can be partially reduced by renal replacement therapy. These solutes originate from intestinal bacterial protein fermentation and are associated with cardiovascular outcomes and chronic kidney disease progression. The aims of this study were to investigate the levels of indoxyl sulfate and p- cresyl sulfate as well as the effect of probiotics on reducing the levels of uremic toxins in pediatric patients on dialysis. <b>Methods:</b> We enrolled 20 pediatric patients undergoing chronic dialysis; 16 patients completed the study. The patients underwent a 12-week regimen of VSL#3, a high-concentration probiotic preparation, and the serum levels of indoxyl sulfate and p- cresyl sulfate were measured before treatment and at 4, 8, and 12 weeks after the regimen by using fluorescence liquid chromatography. To assess the normal range of indoxyl sulfate and p- cresyl sulfate we enrolled the 16 children with normal glomerular filtration rate who had visited an outpatient clinic for asymptomatic microscopic hematuria that had been detected by a school screening in August 2011. <b>Results:</b> The baseline serum levels of indoxyl sulfate and p- cresyl sulfate in the patients on chronic dialysis were significantly higher than those in the children with microscopic hematuria. The baseline serum levels of p- cresyl sulfate in the peritoneal dialysis group were significantly higher than those in the hemodialysis group. There were no significant changes in the levels of these uremic solutes after 12-week VSL#3 treatment in the patients on chronic dialysis. <b>Conclusion:</b> The levels of the uremic toxins p- cresyl sulfate and indoxyl sulfate are highly elevated in pediatric patients on dialysis, but there was no significant effect by

  16. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  17. Co-existence of Methanogenesis and Sulfate Reduction with Common Substrates in Sulfate-Rich Estuarine Sediments

    Directory of Open Access Journals (Sweden)

    Michal Sela-Adler

    2017-05-01

    Full Text Available The competition between sulfate reducing bacteria and methanogens over common substrates has been proposed as a critical control for methane production. In this study, we examined the co-existence of methanogenesis and sulfate reduction with shared substrates over a large range of sulfate concentrations and rates of sulfate reduction in estuarine systems, where these processes are the key terminal sink for organic carbon. Incubation experiments were carried out with sediment samples from the sulfate-methane transition zone of the Yarqon (Israel estuary with different substrates and inhibitors along a sulfate concentrations gradient from 1 to 10 mM. The results show that methanogenesis and sulfate reduction can co-exist while the microbes share substrates over the tested range of sulfate concentrations and at sulfate reduction rates up to 680 μmol L-1 day-1. Rates of methanogenesis were two orders of magnitude lower than rates of sulfate reduction in incubations with acetate and lactate, suggesting a higher affinity of sulfate reducing bacteria for the available substrates. The co-existence of both processes was also confirmed by the isotopic signatures of δ34S in the residual sulfate and that of δ13C of methane and dissolved inorganic carbon. Copy numbers of dsrA and mcrA genes supported the dominance of sulfate reduction over methanogenesis, while showing also the ability of methanogens to grow under high sulfate concentration and in the presence of active sulfate reduction.

  18. Influence of sulfates on chloride diffusion and chloride-induced reinforcement corrosion in limestone cement materials at low temperature

    Czech Academy of Sciences Publication Activity Database

    Sotiriadis, Konstantinos; Rakanta, E.; Mitzithra, M. E.; Batis, G.; Tsivilis, S.

    2017-01-01

    Roč. 29, č. 8 (2017), č. článku 04017060. ISSN 0899-1561 R&D Projects: GA MŠk(CZ) LO1219 Keywords : limestone cement * chloride diffusion * reinforcement corrosion * sulfate attack * low temperature Subject RIV: JN - Civil Engineering OBOR OECD: Composites (including laminates, reinforced plastics, cermets, combined natural and synthetic fibre fabrics Impact factor: 1.644, year: 2016 http://ascelibrary.org/doi/abs/10.1061/%28ASCE%29MT.1943-5533.0001895

  19. Final report on the safety assessment of sodium cetearyl sulfate and related alkyl sulfates as used in cosmetics.

    Science.gov (United States)

    Fiume, Monice; Bergfeld, Wilma F; Belsito, Donald V; Klaassen, Curtis D; Marks, James G; Shank, Ronald C; Slaga, Thomas J; Snyder, Paul W; Alan Andersen, F

    2010-05-01

    Sodium cetearyl sulfate is the sodium salt of a mixture of cetyl and stearyl sulfate. The other ingredients in this safety assessment are also alkyl salts, including ammonium coco-sulfate, ammonium myristyl sulfate, magnesium coco-sulfate, sodium cetyl sulfate, sodium coco/hydrogenated tallow sulfate, sodium coco-sulfate, sodium decyl sulfate, sodium ethylhexyl sulfate, sodium myristyl sulfate, sodium oleyl sulfate, sodium stearyl sulfate, sodium tallow sulfate, sodium tridecyl sulfate, and zinc coco-sulfate. These ingredients are surfactants used at concentrations from 0.1% to 29%, primarily in soaps and shampoos. Many of these ingredients are not in current use. The Cosmetic Ingredient Review (CIR) Expert Panel previously completed a safety assessment of sodium and ammonium lauryl sulfate. The data available for sodium lauryl sulfate and ammonium lauryl sulfate provide sufficient basis for concluding that sodium cetearyl sulfate and related alkyl sulfates are safe in the practices of use and concentration described in the safety assessment.

  20. Rare earth sulfates

    International Nuclear Information System (INIS)

    Komissarova, L.N.; Shatskij, V.M.; Pokrovskij, A.N.; Chizhov, S.M.; Bal'kina, T.I.; Suponitskij, Yu.L.

    1986-01-01

    Results of experimental works on the study of synthesis conditions, structure and physico-chemical properties of rare earth, scandium and yttrium sulfates, have been generalized. Phase diagrams of solubility and fusibility, thermodynamic and crystallochemical characteristics, thermal stability of hydrates and anhydrous sulfates of rare earths, including normal, double (with cations of alkali and alkaline-earth metals), ternary and anion-mixed sulfates of rare earths, as well as their adducts, are considered. The state of ions of rare earths, scandium and yttrium in aqueous sulfuric acid solutions is discussed. Data on the use of rare earth sulfates are given

  1. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  2. Heparan sulfate biosynthesis

    DEFF Research Database (Denmark)

    Multhaupt, Hinke A B; Couchman, John R

    2012-01-01

    Heparan sulfate is perhaps the most complex polysaccharide known from animals. The basic repeating disaccharide is extensively modified by sulfation and uronic acid epimerization. Despite this, the fine structure of heparan sulfate is remarkably consistent with a particular cell type. This suggests...... that the synthesis of heparan sulfate is tightly controlled. Although genomics has identified the enzymes involved in glycosaminoglycan synthesis in a number of vertebrates and invertebrates, the regulation of the process is not understood. Moreover, the localization of the various enzymes in the Golgi apparatus has......-quality resolution of the distribution of enzymes. The EXT2 protein, which when combined as heterodimers with EXT1 comprises the major polymerase in heparan sulfate synthesis, has been studied in depth. All the data are consistent with a cis-Golgi distribution and provide a starting point to establish whether all...

  3. Modeling of ferric sulfate decomposition and sulfation of potassium chloride during grate‐firing of biomass

    DEFF Research Database (Denmark)

    Wu, Hao; Jespersen, Jacob Boll; Jappe Frandsen, Flemming

    2013-01-01

    Ferric sulfate is used as an additive in biomass combustion to convert the released potassium chloride to the less harmful potassium sulfate. The decomposition of ferric sulfate is studied in a fast heating rate thermogravimetric analyzer and a volumetric reaction model is proposed to describe...... the process. The yields of sulfur oxides from ferric sulfate decomposition under boiler conditions are investigated experimentally, revealing a distribution of approximately 40% SO3 and 60% SO2. The ferric sulfate decomposition model is combined with a detailed kinetic model of gas‐phase KCl sulfation...... and a model of K2SO4 condensation to simulate the sulfation of KCl by ferric sulfate addition. The simulation results show good agreements with experiments conducted in a biomass grate‐firing reactor. The results indicate that the SO3 released from ferric sulfate decomposition is the main contributor to KCl...

  4. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Correction: Dermatan sulfate in tunicate phylogeny: Order-specific sulfation pattern and the effect of [→4IdoA(2-Sulfateβ-1→3GalNAc(4-Sulfateβ-1→] motifs in dermatan sulfate on heparin cofactor II activity

    Directory of Open Access Journals (Sweden)

    Sugahara Kazuyuki

    2011-07-01

    Full Text Available Abstract After the publication of the work entitled "Dermatan sulfate in tunicate phylogeny: Order-specific sulfation pattern and the effect of [→4IdoA(2-Sulfateβ-1→3GalNAc(4-Sulfateβ-1→] motifs in dermatan sulfate on heparin cofactor II activity", by Kozlowski et al., BMC Biochemistry 2011, 12:29, we found that the legends to Figures 2 to 5 contain serious mistakes that compromise the comprehension of the work. This correction article contains the correct text of the legends to Figures 2 to 5.

  6. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Mechanistic modeling of biocorrosion caused by biofilms of sulfate reducing bacteria and acid producing bacteria.

    Science.gov (United States)

    Xu, Dake; Li, Yingchao; Gu, Tingyue

    2016-08-01

    Biocorrosion is also known as microbiologically influenced corrosion (MIC). Most anaerobic MIC cases can be classified into two major types. Type I MIC involves non-oxygen oxidants such as sulfate and nitrate that require biocatalysis for their reduction in the cytoplasm of microbes such as sulfate reducing bacteria (SRB) and nitrate reducing bacteria (NRB). This means that the extracellular electrons from the oxidation of metal such as iron must be transported across cell walls into the cytoplasm. Type II MIC involves oxidants such as protons that are secreted by microbes such as acid producing bacteria (APB). The biofilms in this case supply the locally high concentrations of oxidants that are corrosive without biocatalysis. This work describes a mechanistic model that is based on the biocatalytic cathodic sulfate reduction (BCSR) theory. The model utilizes charge transfer and mass transfer concepts to describe the SRB biocorrosion process. The model also includes a mechanism to describe APB attack based on the local acidic pH at a pit bottom. A pitting prediction software package has been created based on the mechanisms. It predicts long-term pitting rates and worst-case scenarios after calibration using SRB short-term pit depth data. Various parameters can be investigated through computer simulation. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Corrosion of Iron by Sulfate-Reducing Bacteria: New Views of an Old Problem

    Science.gov (United States)

    Garrelfs, Julia

    2014-01-01

    About a century ago, researchers first recognized a connection between the activity of environmental microorganisms and cases of anaerobic iron corrosion. Since then, such microbially influenced corrosion (MIC) has gained prominence and its technical and economic implications are now widely recognized. Under anoxic conditions (e.g., in oil and gas pipelines), sulfate-reducing bacteria (SRB) are commonly considered the main culprits of MIC. This perception largely stems from three recurrent observations. First, anoxic sulfate-rich environments (e.g., anoxic seawater) are particularly corrosive. Second, SRB and their characteristic corrosion product iron sulfide are ubiquitously associated with anaerobic corrosion damage, and third, no other physiological group produces comparably severe corrosion damage in laboratory-grown pure cultures. However, there remain many open questions as to the underlying mechanisms and their relative contributions to corrosion. On the one hand, SRB damage iron constructions indirectly through a corrosive chemical agent, hydrogen sulfide, formed by the organisms as a dissimilatory product from sulfate reduction with organic compounds or hydrogen (“chemical microbially influenced corrosion”; CMIC). On the other hand, certain SRB can also attack iron via withdrawal of electrons (“electrical microbially influenced corrosion”; EMIC), viz., directly by metabolic coupling. Corrosion of iron by SRB is typically associated with the formation of iron sulfides (FeS) which, paradoxically, may reduce corrosion in some cases while they increase it in others. This brief review traces the historical twists in the perception of SRB-induced corrosion, considering the presently most plausible explanations as well as possible early misconceptions in the understanding of severe corrosion in anoxic, sulfate-rich environments. PMID:24317078

  10. Direct Sulfation of Limestone

    DEFF Research Database (Denmark)

    Hu, Guilin; Dam-Johansen, Kim; Wedel, Stig

    2007-01-01

    The direct sulfation of limestone was studied in a laboratory fixed-bed reactor. It is found that the direct sulfation of limestone involves nucleation and crystal grain growth of the solid product (anhydrite). At 823 K and at low-conversions (less than about 0.5 %), the influences of SO2, O-2...... and CO2 on the direct sulfation of limestone corresponds to apparent reaction orders of about 0.2, 0.2 and -0.5, respectively. Water is observed to promote the sulfation reaction and increase the apparent reaction orders of SO2 and O-2. The influence of O-2 at high O-2 concentrations (> about 15...... %) becomes negligible. In the temperature interval from 723 K to 973 K, an apparent activation energy of about 104 kJ/mol is observed for the direct sulfation of limestone. At low temperatures and low conversions, the sulfation process is most likely under mixed control by chemical reaction and solid...

  11. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Measurement of chemical leaching potential of sulfate from landfill disposed sulfate containing wastes.

    Science.gov (United States)

    Sun, Wenjie; Barlaz, Morton A

    2015-02-01

    A number of sulfate-containing wastes are disposed in municipal solid wastes (MSW) landfills including residues from coal, wood, and MSW combustion, and construction and demolition (C&D) waste. Under anaerobic conditions that dominate landfills, the sulfate can be reduced to hydrogen sulfide which is problematic for several reasons including its low odor threshold, toxicity, and corrosive nature. The overall objective of this study was to evaluate existing protocols for the quantification of total leachable sulfate from solid samples and to compare their effectiveness and efficiency with a new protocol described in this study. Methods compared include two existing acid extraction protocols commonly used in the U.S., a pH neutral protocol that requires multiple changes of the leaching solution, and a new acid extraction method. The new acid extraction method was shown to be simple and effective to measure the leaching potential of sulfate from a range of landfill disposed sulfate-containing wastes. However, the acid extraction methods do not distinguish between sulfate and other forms of sulfur and are thus most useful when sulfate is the only form of sulfur present. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Inhibition of synthesis of heparan sulfate by selenate: Possible dependence on sulfation for chain polymerization

    International Nuclear Information System (INIS)

    Dietrich, C.P.; Nader, H.B.; Buonassisi, V.; Colburn, P.

    1988-01-01

    Selenate, a sulfation inhibitor, blocks the synthesis of heparan sulfate and chondroitin sulfate by cultured endothelial cells. In contrast, selenate does not affect the production of hyaluronic acid, a nonsulfated glycosaminoglycan. No differences in molecular weight, [ 3 H]glucosamine/[ 35 S]sulfuric acid ratios, or disaccharide composition were observed when the heparan sulfate synthesized by selenate-treated cells was compared with that of control cells. The absence of undersulfated chains in preparations from cultures exposed to selenate supports the concept that, in the intact cell, the polymerization of heparan sulfate might be dependent on the sulfation of the saccharide units added to the growing glycosaminoglycan chain

  15. Growth and sedimentation of fine particles produced in aqueous solutions of palladium sulfate and palladium sulfate-silver sulfate induced by gamma-ray irradiation

    International Nuclear Information System (INIS)

    Hatada, Motoyoshi; Jonah, C.D.

    1994-10-01

    It is known that palladium and palladium-silver fine particles were formed from deaerated aqueous solutions of palladium sulfate and palladium sulfate-silver sulfate induced by gamma-ray irradiation. Changes in particle size and with amount of particles in the solution with time during and after irradiation were studied using dynamic light scattering technique and UV spectrophotometer. The particles formed from palladium sulfate solution are found to be water-filled bulky particles of diameter of 200 nm, which grow by mutual coagulation even after irradiation was terminated. Average density depends on concentration of palladium ion in the solution and dose, and the lowest density was about 2 g/cm 3 for particles of 200 nm obtained from 0.06 mM solution by 2.4 kGy irradiation. The average density of the particles obtained from palladium sulfate-silver sulfate solutions was smaller than those obtained for the corresponding palladium sulfate solutions. Supersonic agitation destroyed coagulated precipitates to form fine particles, but did not form clusters of a few atoms. (author)

  16. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  17. High rates of sulfate reduction in a low-sulfate hot spring microbial mat are driven by a low level of diversity of sulfate-respiring microorganisms

    DEFF Research Database (Denmark)

    Dillon, Jesse G; Fishbain, Susan; Miller, Scott R

    2007-01-01

    The importance of sulfate respiration in the microbial mat found in the low-sulfate thermal outflow of Mushroom Spring in Yellowstone National Park was evaluated using a combination of molecular, microelectrode, and radiotracer studies. Despite very low sulfate concentrations, this mat community...... was shown to sustain a highly active sulfur cycle. The highest rates of sulfate respiration were measured close to the surface of the mat late in the day when photosynthetic oxygen production ceased and were associated with a Thermodesulfovibrio-like population. Reduced activity at greater depths...... was correlated with novel populations of sulfate-reducing microorganisms, unrelated to characterized species, and most likely due to both sulfate and carbon limitation....

  18. Coupled effects of the precipitation of secondary species on the mechanical behaviour and chemical degradation of concretes; Les effets couples de la precipitation d'especes secondaires sur le comportement mecanique et la degradation chimique des betons

    Energy Technology Data Exchange (ETDEWEB)

    Planel, D

    2002-06-01

    Sulfate attack of cement-based materials remains an important problem for the durability assessment of containers and disposal engineering barriers dedicated to the long-term storage of radioactive wastes since underground water which may reach these elements contains small quantities of sulfates (7-31 mmol/1). This work contributes to the study of sulfate-induced damage mechanisms, to their understanding and modelling. The experimental phases of this study aimed at the understanding of the different physico-chemical phenomena involved during an external sulfate attack at following their evolution and their impact on the transport and mechanical properties of the material. Leaching experiments in pure water and in a solution of sodium sulfate (with a sulfate content of 15 mmol/1), have been performed simultaneously on OPC paste (w/c 0,4)in order to allow a comparison of test results. The frequent analysis of the leachant has shown a consumption of sulfate ions by the matrix, proportional to the square rate of time. The use of X-Ray Diffraction on powders, obtained by scraping the calcium-depleted part of the samples, led a precise view of the cement paste mineralogy, during sulfate attack. The use of Scanning Electron Microscopy (SEM) and Energy Dispersive Spectrometer (EDS) confirmed the correctness of XRD profiles and brought important informations concerning cracking distribution and localisation. In addition, a visual monitoring of crack appearance and evolution completed the previous observations. Based on these experimental results, a simplified model accounting for the chemical degradation of cement paste in sulfated water has been proposed. A geochemical code, coupling the chemistry in solution with the reactive transport in porous media has been used for this purpose. The model accounts for the evolution of transport properties (diffusivity) associated with the calcium-depleting of the cement matrix and the precipitation of secondary phases (gypsum

  19. Coupled effects of the precipitation of secondary species on the mechanical behaviour and chemical degradation of concretes; Les effets couples de la precipitation d'especes secondaires sur le comportement mecanique et la degradation chimique des betons

    Energy Technology Data Exchange (ETDEWEB)

    Planel, D

    2002-06-01

    Sulfate attack of cement-based materials remains an important problem for the durability assessment of containers and disposal engineering barriers dedicated to the long-term storage of radioactive wastes since underground water which may reach these elements contains small quantities of sulfates (7-31 mmol/1). This work contributes to the study of sulfate-induced damage mechanisms, to their understanding and modelling. The experimental phases of this study aimed at the understanding of the different physico-chemical phenomena involved during an external sulfate attack at following their evolution and their impact on the transport and mechanical properties of the material. Leaching experiments in pure water and in a solution of sodium sulfate (with a sulfate content of 15 mmol/1), have been performed simultaneously on OPC paste (w/c 0,4)in order to allow a comparison of test results. The frequent analysis of the leachant has shown a consumption of sulfate ions by the matrix, proportional to the square rate of time. The use of X-Ray Diffraction on powders, obtained by scraping the calcium-depleted part of the samples, led a precise view of the cement paste mineralogy, during sulfate attack. The use of Scanning Electron Microscopy (SEM) and Energy Dispersive Spectrometer (EDS) confirmed the correctness of XRD profiles and brought important informations concerning cracking distribution and localisation. In addition, a visual monitoring of crack appearance and evolution completed the previous observations. Based on these experimental results, a simplified model accounting for the chemical degradation of cement paste in sulfated water has been proposed. A geochemical code, coupling the chemistry in solution with the reactive transport in porous media has been used for this purpose. The model accounts for the evolution of transport properties (diffusivity) associated with the calcium-depleting of the cement matrix and the precipitation of secondary phases (gypsum

  20. Coupled effects of the precipitation of secondary species on the mechanical behaviour and chemical degradation of concretes

    International Nuclear Information System (INIS)

    Planel, D.

    2002-06-01

    Sulfate attack of cement-based materials remains an important problem for the durability assessment of containers and disposal engineering barriers dedicated to the long-term storage of radioactive wastes since underground water which may reach these elements contains small quantities of sulfates (7-31 mmol/1). This work contributes to the study of sulfate-induced damage mechanisms, to their understanding and modelling. The experimental phases of this study aimed at the understanding of the different physico-chemical phenomena involved during an external sulfate attack at following their evolution and their impact on the transport and mechanical properties of the material. Leaching experiments in pure water and in a solution of sodium sulfate (with a sulfate content of 15 mmol/1), have been performed simultaneously on OPC paste (w/c 0,4)in order to allow a comparison of test results. The frequent analysis of the leachant has shown a consumption of sulfate ions by the matrix, proportional to the square rate of time. The use of X-Ray Diffraction on powders, obtained by scraping the calcium-depleted part of the samples, led a precise view of the cement paste mineralogy, during sulfate attack. The use of Scanning Electron Microscopy (SEM) and Energy Dispersive Spectrometer (EDS) confirmed the correctness of XRD profiles and brought important informations concerning cracking distribution and localisation. In addition, a visual monitoring of crack appearance and evolution completed the previous observations. Based on these experimental results, a simplified model accounting for the chemical degradation of cement paste in sulfated water has been proposed. A geochemical code, coupling the chemistry in solution with the reactive transport in porous media has been used for this purpose. The model accounts for the evolution of transport properties (diffusivity) associated with the calcium-depleting of the cement matrix and the precipitation of secondary phases (gypsum

  1. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  2. Sulfation of corrosive alkali chlorides by ammonium sulfate in a biomass fired CFB boiler

    Energy Technology Data Exchange (ETDEWEB)

    Brostroem, Markus; Backman, Rainer; Nordin, Anders [Energy Technology and Thermal Process Chemistry, Umeaa University, SE-901 87 Umeaa (Sweden); Kassman, Haakan [Vattenfall Power Consultant AB, Box 1046, SE-611 29 Nykoeping (Sweden); Helgesson, Anna; Berg, Magnus; Andersson, Christer [Vattenfall Research and Development AB, SE-814 26 Aelvkarleby (Sweden)

    2007-12-15

    Biomass and waste derived fuels contain relatively high amounts of alkali and chlorine, but contain very little sulfur. Combustion of such fuels can result in increased deposit formation and superheater corrosion. These problems can be reduced by using a sulfur containing additive, such as ammonium sulfate, which reacts with the alkali chlorides and forms less corrosive sulfates. Ammonium sulfate injection together with a so-called in situ alkali chloride monitor (IACM) is patented and known as ''ChlorOut''. IACM measures the concentrations of alkali chlorides (mainly KCl in biomass combustion) at superheater temperatures. Tests with and without spraying ammonium sulfate into the flue gases have been performed in a 96MW{sub th}/25MW{sub e} circulating fluidized bed (CFB) boiler. The boiler was fired mainly with bark and a chlorine containing waste. KCl concentration was reduced from more than 15 ppm to approximately 2 ppm during injection of ammonium sulfate. Corrosion probe measurements indicated that both deposit formation and material loss due to corrosion were decreased using the additive. Analysis of the deposits showed significantly higher concentration of sulfur and almost no chlorine in the case with ammonium sulfate. Results from impactor measurements supported that KCl was sulfated to potassium sulfate by the additive. (author)

  3. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  4. Perceived family social support buffers against the effects of exposure to rocket attacks on adolescent depression, aggression, and severe violence.

    Science.gov (United States)

    Shahar, Golan; Henrich, Christopher C

    2016-02-01

    The authors compared the protective effects of 3 sources of perceived social support-from family members, friends, and school personnel-on internalizing and externalizing symptoms in adolescents exposed to rocket attacks. Data were based on 362 Israeli adolescents (median age = 14), chronically exposed to rockets from the Gaza Strip, for whom robust effects of exposure on internalizing and externalizing symptoms were reported during the 2009-2010 period (Henrich & Shahar, 2013). New analyses revealed that perceived family social support assessed in 2009 buffered against the effect of exposure to rocket attacks on depression, aggression, and severe violence during 2009-2010. Findings are consistent with a human-ecological perspective exposure to political violence and encourage the employment of family-based preventive interventions in afflicted areas. (c) 2016 APA, all rights reserved).

  5. Estimating parameters of chaotic systems synchronized by external driving signal

    International Nuclear Information System (INIS)

    Wu Xiaogang; Wang Zuxi

    2007-01-01

    Noise-induced synchronization (NIS) has evoked great research interests recently. Two uncoupled identical chaotic systems can achieve complete synchronization (CS) by feeding a common noise with appropriate intensity. Actually, NIS belongs to the category of external feedback control (EFC). The significance of applying EFC in secure communication lies in fact that the trajectory of chaotic systems is disturbed so strongly by external driving signal that phase space reconstruction attack fails. In this paper, however, we propose an approach that can accurately estimate the parameters of the chaotic systems synchronized by external driving signal through chaotic transmitted signal, driving signal and their derivatives. Numerical simulation indicates that this approach can estimate system parameters and external coupling strength under two driving modes in a very rapid manner, which implies that EFC is not superior to other methods in secure communication

  6. Chondroitin sulfate/dermatan sulfate sulfatases from mammals and bacteria.

    Science.gov (United States)

    Wang, Shumin; Sugahara, Kazuyuki; Li, Fuchuan

    2016-12-01

    Sulfatases that specifically catalyze the hydrolysis of the sulfate groups on chondroitin sulfate (CS)/dermatan sulfate (DS) poly- and oligosaccharides belong to the formylglycine-dependent family of sulfatases and have been widely found in various mammalian and bacterial organisms. However, only a few types of CS/DS sulfatase have been identified so far. Recently, several novel CS/DS sulfatases have been cloned and characterized. Advanced studies have provided significant insight into the biological function and mechanism of action of CS/DS sulfatases. Moreover, further studies will provide powerful tools for structural and functional studies of CS/DS as well as related applications. This article reviews the recent progress in CS/DS sulfatase research and is expected to initiate further research in this field.

  7. Novel processes for anaerobic sulfate production from elemental sulfur by sulfate-reducing bacteria

    Science.gov (United States)

    Lovley, D.R.; Phillips, E.J.P.

    1994-01-01

    Sulfate reducers and related organisms which had previously been found to reduce Fe(III) with H2 or organic electron donors oxidized S0 to sulfate when Mn(IV) was provided as an electron acceptor. Organisms catalyzing this reaction in washed cell suspensions included Desulfovibrio desulfuricans, Desulfomicrobium baculatum. Desulfobacterium autotrophicum, Desulfuromonas acetoxidans, and Geobacter metallireducens. These organisms produced little or no sulfate from S0 with Fe(III) as a potential electron acceptor or in the absence of an electron acceptor. In detailed studies with Desulfovibrio desulfuricans, the stoichiometry of sulfate and Mn(II) production was consistent with the reaction S0 + 3 MnO2 + 4H+ ???SO42- + 3Mn(II) + 2H2O. None of the organisms evaluated could be grown with S0 as the sole electron donor and Mn(IV) as the electron acceptor. In contrast to the other sulfate reducers evaluated, Desulfobulbus propionicus produced sulfate from S0 in the absence of an electron acceptor and Fe(III) oxide stimulated sulfate production. Sulfide also accumulated in the absence of Mn(IV) or Fe(III). The stoichiometry of sulfate and sulfide production indicated that Desulfobulbus propionicus disproportionates S0 as follows: 4S0 + 4H2O???SO42- + 3HS- + 5 H+. Growth of Desulfobulbus propionicus with S0 as the electron donor and Fe(III) as a sulfide sink and/or electron acceptor was very slow. The S0 oxidation coupled to Mn(IV) reduction described here provides a potential explanation for the Mn(IV)-dependent sulfate production that previous studies have observed in anoxic marine sediments. Desulfobulbus propionicus is the first example of a pure culture known to disproportionate S0.

  8. Heparan sulfate-chondroitin sulfate hybrid proteoglycan of the cell surface and basement membrane of mouse mammary epithelial cells

    International Nuclear Information System (INIS)

    David, G.; Van den Berghe, H.

    1985-01-01

    Chondroitin sulfate represents approximately 15% of the 35 SO 4 -labeled glycosaminoglycans carried by the proteoglycans of the cell surface and of the basolateral secretions of normal mouse mammary epithelial cells in culture. Evidence is provided that these chondroitin sulfate-carrying proteoglycans are hybrid proteoglycans, carrying both chondroitin sulfate and heparan sulfate chains. Complete N-desulfation but limited O-desulfation, by treatment with dimethyl sulfoxide, of the proteoglycans decreased the anionic charge of the chondroitin sulfate-carrying proteoglycans to a greater extent than it decreased the charge of their constituent chondroitin sulfate chains. Partial depolymerization of the heparan sulfate residues of the proteoglycans with nitrous acid or with heparin lyase also reduced the effective molecular radius of the chondroitin sulfate-carrying proteoglycans. The effect of heparin lyase on the chondroitin sulfate-carrying proteoglycans was prevented by treating the proteoglycan fractions with dimethyl sulfoxide, while the effect of nitrous acid on the dimethyl sulfoxide-treated proteoglycans was prevented by acetylation. This occurrence of heparan sulfate-chondroitin sulfate hybrid proteoglycans suggests that the substitution of core proteins by heparan sulfate or chondroitin sulfate chains may not solely be determined by the specific routing of these proteins through distinct chondroitin sulfate and heparan sulfate synthesizing mechanisms. Moreover, regional and temporal changes in pericellular glycosaminoglycan compositions might be due to variable postsynthetic modification of a single gene product

  9. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    . Antennas are an integral part of wireless networks. A selected antenna type affects performance, network availability and safety of wireless networks. Finding default values CommView for WiFi is a tool for monitoring data flow (sniffer especially written for wireless networks. Cain & Abel is a universal tool for the detection of all types of passwords. If a wireless network uses a protective mechanism of MAC address filtering, then the attacker must collect the IP addresses. To connect to a wireless access point, it is necessary to know its SSID. Contrary to what some people think, SSID is not a password. Wardriving Driving a car with a portable computer aimed at the detection of wireless computer networks, onto which connection is later possible, is called wardriving. For wardriving, it is necessary to have an appropriate software tool and a wireless network card or an adapter, on which an external antenna can be added to increase signal strength. It is also possible to use a global positioning device (GPS to determine the coordinates of the detected wireless access points on a map. The most widely used software tools for wardriving are Network Stumbler, Kismet and MiniStumbler. Network attacks Hackers’ most usual attack to circumvent the basic access control in wireless networks is masking their own MAC address with an MAC address of a legitimate client on the network (MAC address spoofing. Man-in-the-Middle attack inserts the attacker’s system in the middle between wireless clients and the wireless access point. Legitimate wireless users will be fooled when they try to connect, by being associated to the attacker's system instead of the legitimate wireless access point. The ARP table poisoning attack inserts the attacker's system in the middle of communication between legitimate clients and the wireless access point. Attackers could use the address resolution protocol if it is running on the network. The aim of this attack is to introduce an attacker as a legitimate

  10. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  11. Sulfates on Mars: A systematic Raman spectroscopic study of hydration states of magnesium sulfates

    Science.gov (United States)

    Wang, A.; Freeman, J.J.; Jolliff, B.L.; Chou, I.-Ming

    2006-01-01

    The martian orbital and landed surface missions, OMEGA on Mar Express and the two Mars Explorations Rovers, respectively, have yielded evidence pointing to the presence of magnesium sulfates on the martian surface. In situ identification of the hydration states of magnesium sulfates, as well as the hydration states of other Ca- and Fe- sulfates, will be crucial in future landed missions on Mars in order to advance our knowledge of the hydrologic history of Mars as well as the potential for hosting life on Mars. Raman spectroscopy is a technique well-suited for landed missions on the martian surface. In this paper, we report a systematic study of the Raman spectra of the hydrates of magnesium sulfate. Characteristic and distinct Raman spectral patterns were observed for each of the 11 distinct hydrates of magnesium sulfates, crystalline and non-crystalline. The unique Raman spectral features along with the general tendency of the shift of the position of the sulfate ??1 band towards higher wavenumbers with a decrease in the degree of hydration allow in situ identification of these hydrated magnesium sulfates from the raw Raman spectra of mixtures. Using these Raman spectral features, we have started the study of the stability field of hydrated magnesium sulfates and the pathways of their transformations at various temperature and relative humidity conditions. In particular we report on the Raman spectrum of an amorphous hydrate of magnesium sulfate (MgSO4??2H2O) that may have specific relevance for the martian surface. ?? 2006 Elsevier Inc. All rights reserved.

  12. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  13. Analysis of tyrosine-O-sulfation

    DEFF Research Database (Denmark)

    Bundgaard, J.R.; Sen, J.W.; Johnsen, A.H.

    2008-01-01

    Tyrosine O-sulfation was first described about 50 years ago as a post-translational modification of fibrinogen. In the following 30 years it was considered to be a rare modification affecting only a few proteins and peptides. However, in the beginning of the 1980s tyrosine (Tyr) sulfation was shown...... to be a common modification and since then an increasing number of proteins have been identified as sulfated. The target proteins belong to the classes of secretory, plasma membrane, and lysosomal proteins, which reflects the intracellular localization of the enzymes catalyzing Tyr sulfation, the tyrosylprotein...... sulfotransferases (TPSTs).Traditionally, Tyr sulfation has been analyzed by incorporation of radiolabeled sulfate into target cells followed by purification of the target protein. Subsequently, the protein is degraded enzymatically or by alkaline hydrolysis followed by thin-layer electrophoresis to demonstrate...

  14. Immunohistochemical localization of chondroitin sulfate, chondroitin sulfate proteoglycan, heparan sulfate proteoglycan, entactin, and laminin in basement membranes of postnatal developing and adult rat lungs

    DEFF Research Database (Denmark)

    Sannes, P L; Burch, K K; Khosla, J

    1993-01-01

    Histologic preparations of lungs from 1-, 5-, 10-, 18-, and 25-day-old postnatal and adult rats were examined immunohistochemically with antibodies specific against chondroitin sulfate (CS), basement membrane chondroitin sulfate proteoglycan (BM-CSPG), heparan sulfate proteoglycan (HSPG), entactin...

  15. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  17. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  18. Distributed Classification of Localization Attacks in Sensor Networks Using Exchange-Based Feature Extraction and Classifier

    Directory of Open Access Journals (Sweden)

    Su-Zhe Wang

    2016-01-01

    Full Text Available Secure localization under different forms of attack has become an essential task in wireless sensor networks. Despite the significant research efforts in detecting the malicious nodes, the problem of localization attack type recognition has not yet been well addressed. Motivated by this concern, we propose a novel exchange-based attack classification algorithm. This is achieved by a distributed expectation maximization extractor integrated with the PECPR-MKSVM classifier. First, the mixed distribution features based on the probabilistic modeling are extracted using a distributed expectation maximization algorithm. After feature extraction, by introducing the theory from support vector machine, an extensive contractive Peaceman-Rachford splitting method is derived to build the distributed classifier that diffuses the iteration calculation among neighbor sensors. To verify the efficiency of the distributed recognition scheme, four groups of experiments were carried out under various conditions. The average success rate of the proposed classification algorithm obtained in the presented experiments for external attacks is excellent and has achieved about 93.9% in some cases. These testing results demonstrate that the proposed algorithm can produce much greater recognition rate, and it can be also more robust and efficient even in the presence of excessive malicious scenario.

  19. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  20. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  1. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  2. Acute Exacerbations of COPD Are Associated With Increased Expression of Heparan Sulfate and Chondroitin Sulfate in BAL.

    Science.gov (United States)

    Papakonstantinou, Eleni; Klagas, Ioannis; Roth, Michael; Tamm, Michael; Stolz, Daiana

    2016-03-01

    Acute exacerbations of COPD (AECOPDs) are associated with accelerated aggravation of clinical symptoms and deterioration of pulmonary function. The mechanisms by which exacerbations may contribute to airway remodeling and declined lung function are poorly understood. We investigated whether AECOPDs are associated with differential expression of glycosaminoglycans in BAL in a cohort of 97 patients with COPD. Patients with COPD with either stable disease (n = 53) or AECOPD (n = 44) and undergoing diagnostic bronchoscopy were matched for demographics and lung function parameters. Levels of heparan sulfate, chondroitin sulfate, dermatan sulfate, and matrix metalloproteinases (MMPs) in BAL were measured by enzyme-linked immunosorbent assay. Heparan sulfate and chondroitin sulfate were significantly increased in BAL of patients during exacerbations. Levels of heparan sulfate were higher in the BAL of patients with microbial infections. Chondroitin sulfate was negatively correlated with FEV1 % predicted but not with diffusing capacity of lung for carbon monoxide % predicted, indicating that chondroitin sulfate is associated with airway remodeling, leading to obstruction rather than to emphysema. Furthermore, heparan sulfate and chondroitin sulfate were significantly correlated with MMP-9, MMP-2, and MMP-12 in BAL, indicating that they were cleaved from their respective proteoglycans by MMPs and subsequently washed out in BAL. During AECOPD, there is increased expression of heparan sulfate and chondroitin sulfate in BAL. These molecules are significantly correlated with MMPs in BAL, indicating that they may be associated with airway remodeling and may lead to lung function decline during exacerbations of COPD. Copyright © 2016 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  3. Assessment and testing of industrial devices robustness against cyber security attacks

    International Nuclear Information System (INIS)

    Tilaro, F.; Copy, B.

    2012-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. CERN - in collaboration with Siemens - has designed and implemented a dedicated working environment, the Test-bench for Robustness of Industrial Equipment. Such tests attempt to detect possible anomalies by exploiting corrupt communication channels and manipulating the normal behavior of the communication protocols, in the same way as a cyber attacker would proceed. Our approach consists of analyzing protocol implementations by injecting malformed PDUs (Protocol Data Unit) to corrupt the normal behaviour of the system. As a PDU typically has many fields, the number of possible syntactically faulty PDUs grows exponentially with the number of fields. In this document, we proposed a strategy to explore this huge test domain using a hybrid approach of fuzzing and syntax techniques, specifically developed to evaluate industrial device communication robustness. So far, not all the tests can be integrated into automatic tools, human analysis and management is necessary to discover and investigate specific possible failures

  4. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  5. Chondroitin Sulfate Perlecan Enhances Collagen Fibril Formation

    DEFF Research Database (Denmark)

    Kvist, A. J.; Johnson, A. E.; Mörgelin, M.

    2006-01-01

    in collagen type II fibril assembly by perlecan-null chondrocytes. Cartilage perlecan is a heparin sulfate or a mixed heparan sulfate/chondroitin sulfate proteoglycan. The latter form binds collagen and accelerates fibril formation in vitro, with more defined fibril morphology and increased fibril diameters...... produced in the presence of perlecan. Interestingly, the enhancement of collagen fibril formation is independent on the core protein and is mimicked by chondroitin sulfate E but neither by chondroitin sulfate D nor dextran sulfate. Furthermore, perlecan chondroitin sulfate contains the 4,6-disulfated...... disaccharides typical for chondroitin sulfate E. Indeed, purified glycosaminoglycans from perlecan-enriched fractions of cartilage extracts contain elevated levels of 4,6-disulfated chondroitin sulfate disaccharides and enhance collagen fibril formation. The effect on collagen assembly is proportional...

  6. Activation and transfer of sulfate in biological systems (1960); Activation biologique du sulfate et son transfert (1960)

    Energy Technology Data Exchange (ETDEWEB)

    Chapeville, F [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1960-07-01

    It examines in this review the successive stages of active sulfate formation and its role in biological synthesis of sulfuric esters. The possible role of active sulfate as intermediary in sulfate reduction is also discussed. (author) [French] On examine dans cette etude les stades successifs de la mise en evidence du sulfate actif, son role dans la formation des esters sulfuriques de natures diverses, ainsi que sa participation eventuelle comme intermediaire au cours de la reduction du sulfate. On decrit aussi un procede de preparation du systeme biologique, generateur du sulfate actif et une methode de synthese chimique. (auteur)

  7. Quantitative analysis of glycosaminoglycans, chondroitin/dermatan sulfate, hyaluronic acid, heparan sulfate, and keratan sulfate by liquid chromatography-electrospray ionization-tandem mass spectrometry.

    Science.gov (United States)

    Osago, Harumi; Shibata, Tomoko; Hara, Nobumasa; Kuwata, Suguru; Kono, Michihaya; Uchio, Yuji; Tsuchiya, Mikako

    2014-12-15

    We developed a method using liquid chromatography-electrospray ionization-tandem mass spectrometry (LC-ESI-MS/MS) with a selected reaction monitoring (SRM) mode for simultaneous quantitative analysis of glycosaminoglycans (GAGs). Using one-shot analysis with our MS/MS method, we demonstrated the simultaneous quantification of a total of 23 variously sulfated disaccharides of four GAG classes (8 chondroitin/dermatan sulfates, 1 hyaluronic acid, 12 heparan sulfates, and 2 keratan sulfates) with a sensitivity of less than 0.5 pmol within 20 min. We showed the differences in the composition of GAG classes and the sulfation patterns between porcine articular cartilage and yellow ligament. In addition to the internal disaccharides described above, some saccharides derived from the nonreducing terminal were detected simultaneously. The simultaneous quantification of both internal and nonreducing terminal saccharides could be useful to estimate the chain length of GAGs. This method would help to establish comprehensive "GAGomic" analysis of biological tissues. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  9. Constraining Δ33S signatures of Archean seawater sulfate with carbonate-associated sulfate

    Science.gov (United States)

    Peng, Y.; Bao, H.; Bekker, A.; Hofmann, A.

    2017-12-01

    Non-mass dependent sulfur isotope deviation of S-bearing phases in Archean sedimentary strata, and expressed as Δ33S, has a consistent pattern, i.e., sulfide (pyrite) predominantly bear positive Δ33S values, while Paleoarchean sulfate (barite) has negative Δ33S values. This pattern was later corroborated by observations of negative Δ33S values in Archean volcanogenic massive sulfide deposits and negative Δ33S values in early diagenetic nodular pyrite with a wide range of δ34S values, which is thought to be due to microbial sulfate reduction. These signatures have provided a set of initial conditions for a mechanistic interpretation at physical chemistry level. Unlike the younger geological times when large bodies of seawater evaporite deposits are common, to expand seawater sulfate records, carbonate-associated sulfate (CAS) was utilized as a proxy for ancient seawater sulfate. CAS extracted from the Archean carbonates carries positive Δ33S values. However, CAS could be derived from pyrite oxidation following exposure to modern oxidizing conditions and/or during laboratory extraction procedures. It is, therefore, important for us understanding context of the overall early earth atmospheric condition to empirically confirm whether Archean seawater sulfate was generally characterized by negative Δ33S signatures. Combined δ18O, Δ17O, δ34S, and Δ33S analyses of sequentially extracted water-leachable sulfate (WLS) and acid-leachable sulfate (ALS = CAS) and δ34S and Δ33S analyses of pyrite can help to identify the source of extracted sulfate. We studied drill-core samples of Archean carbonates from the 2.55 Ga Malmani and Campell Rand supgroups, South Africa. Our preliminary results show that 1) neither WLS nor ALS were extracted from samples with extremely low pyrite contents (less than 0.05 wt.%); 2) extractable WLS and ALS is present in samples with relatively high pyrite contents (more than 1 wt.%), and that δ34S and Δ33S values of WLS, ALS, and

  10. Effects of sulfate deprivation on the production of chondroitin/dermatan sulfate by cultures of skin fibroblasts from normal and diabetic individuals

    International Nuclear Information System (INIS)

    Silbert, C.K.; Humphries, D.E.; Palmer, M.E.; Silbert, J.E.

    1991-01-01

    Human skin fibroblast monolayer cultures from two normal men, three Type I diabetic men, and one Type I diabetic woman were incubated with [3H]glucosamine in the presence of diminished concentrations of sulfate. Although total synthesis of [3H]chondroitin/dermatan glycosaminoglycans varied somewhat between cell lines, glycosaminoglycan production was not affected within any line when sulfate levels were decreased from 0.3 mM to 0.06 mM to 0.01 mM to 0 added sulfate. Lowering of sulfate concentrations resulted in diminished sulfation of chondroitin/dermatan in a progressive manner, so that overall sulfation dropped to as low as 19% for one of the lines. Sulfation of chondroitin to form chondroitin 4-sulfate and chondroitin 6-sulfate was progressively and equally affected by decreasing the sulfate concentration in the culture medium. However, sulfation to form dermatan sulfate was preserved to a greater degree, so that the relative proportion of dermatan sulfate to chondroitin sulfate increased. Essentially all the nonsulfated residues were susceptible to chondroitin AC lyase, indicating that little epimerization of glucuronic acid residues to iduronic acid had occurred in the absence of sulfation. These results confirm the previously described dependency of glucuronic/iduronic epimerization on sulfation, and indicate that sulfation of the iduronic acid-containing disaccharide residues of dermatan can take place with sulfate concentrations lower than those needed for 6-sulfation and 4-sulfation of the glucuronic acid-containing disaccharide residues of chondroitin. There were considerable differences among the six fibroblast lines in susceptibility to low sulfate medium and in the proportion of chondroitin 6-sulfate, chondroitin 4-sulfate, and dermatan sulfate. However, there was no pattern of differences between normals and diabetics

  11. INTRACELLULAR SYNTHESIS OF CHONDROITIN SULFATE

    Science.gov (United States)

    Dziewiatkowski, Dominic D.

    1962-01-01

    In autoradiograms of slices of costal cartilage, incubated for 4 hours in a salt solution containing S35-sulfate and then washed extensively and dehydrated, about 85 per cent of the radioactivity was assignable to the chondrocytes. From alkaline extracts of similarly prepared slices of cartilage, 64 to 83 per cent of the total sulfur-35 in the slices was isolated as chondroitin sulfate by chromatography on an anion-exchange resin. In view of the estimate that only about 15 per cent of the radioactivity was in the matrix, the isolation of 64 to 83 per cent of the total sulfur-35 as chondroitin sulfate is a strong argument that the chondrocytes are the loci in which chondroitin sulfate(s) is synthesized. PMID:13888910

  12. Synthesis of N-oleyl O-sulfate chitosan from methyl oleate with O-sulfate chitosan as edible film material

    Science.gov (United States)

    Daniel; Sihaloho, O.; Saleh, C.; Magdaleni, A. R.

    2018-04-01

    The research on the synthesis of N-oleyl O-sulfate chitosan through sulfonation reaction on chitosan with ammonium sulfate and followed by amidation reaction using methyl oleate has been done. In this study, chitosan was chemically modified into N-oleyl O-sulfatechitosan as an edible film making material. N-oleyl O-sulfate chitosan was synthesized by reaction between methyl oleate and O-sulfate chitosan. Wherein the depleted chitosan of O-sulfate chitosan into O-sulfate chitosan was obtained by reaction of sulfonation between ammonium sulfate and chitosan aldimine. While chitosan aldimine was obtained through reaction between chitosan with acetaldehyde. The structure of N-oleyl O-sulfate chitosan was characterized by FT-IR analysis which showed vibration uptake of C-H sp3 group, S=O group, and carbonyl group C=O of the ester. The resulting of N-oleyl O-sulfate chitosan yielded a percentage of 93.52%. Hydrophilic-Lipophilic Balance (HLB) test results gave a value of 6.68. In the toxicity test results of N-oleyl O-sulfate chitosan obtained LC50 value of 3738.4732 ppm. In WVTR (Water Vapor Transmission Rate) test results for chitosan film was 407.625 gram/m2/24 hours and N-oleylO-sulfate chitosan film was 201.125 gram/m2/24 hours.

  13. Corrosion of Alloys 600 ampersand 900 in acidified sulfate and chloride solutions

    International Nuclear Information System (INIS)

    Cullen, W.H.; Partridge, M.J.; Paine, J.P.N.

    1993-01-01

    A program is being performed currently: (1) to better quantify the susceptibility of Alloy 600 and 690 steam generator (SG) tubing materials to intergranular attack (IGA) and intergranular stress corrosion cracking (IGSCC) in acid solutions of the types that could concentrate in steam generator crevices, and (2) to establish the effectiveness of various remedial measures achieved through chemical additions to the secondary side coolant. The main test method is the exposure of stressed C-rings and expanded capsules of SG tubing to acid chloride and sulfate environments of various pH levels, temperatures, and applied potentials. Following these exposures, crack lengths are measured on metallographic cross-sections of the C-rings, and wastage rates calculated from weight loss, surface area and time. Test solutions are based on varying concentrations of sulfate and chloride species, with other contaminants added to some tests. The temperature dependence of the pH of the acidified solutions is calculated using the EPRI-developed MULTEQ computer program. High-temperature pH levels range from values of 2.5 to 7.6 at 315 degrees C, which is the nominal test temperature. Various accelerating and inhibiting factors (pH, temperature, solution composition and concentration, and applied electrochemical potential) are being evaluated

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Corrosion of Alloy 690 process pot by sulfate containing high level radioactive waste at feed stage

    International Nuclear Information System (INIS)

    Sengupta, P.; Soudamini, N.; Kaushik, C.P.; Jagannath; Mishra, R.K.; Kale, G.B.; Raj, K.; Das, D.; Sharma, B.P.

    2008-01-01

    Prolonged exposure of Alloy 690 process pot to sulfate containing high level radioactive waste leads to (a) depletion of Cr from the alloy, (b) intergranular attack and (c) building up of Cr 2 O 3 -Ni 2 O 3 -Fe 2 O 3 mixed oxide surface layer containing Na and Cs sulfate precipitates. Time dependence of material loss from Alloy 690 is found to follow a linear relationship of the type Δw (material loss) = -7.05 + 0.05t. Corrosion rate calculated for 2400 h exposure is 3.66 mpy. Cr and Ni leach rates obtained for the same sample are 1.61 g m -2 d -1 and 2.52 g m -2 d -1 , respectively. Ni leach rates followed a linear time dependence relationship of the type dNL Ni /dt (leach rate) = -0.09 + 0.027t, whereas Cr leach rates obeyed a non-linear relationship of the type dNL Cr /dt (leach rate) = 0.241 + 0.027t - 1.33 x 10 -4 t 1/2

  17. 21 CFR 184.1261 - Copper sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Copper sulfate. 184.1261 Section 184.1261 Food and... Substances Affirmed as GRAS § 184.1261 Copper sulfate. (a) Copper sulfate (cupric sulfate, CuSO4·5H2O, CAS... the reaction of sulfuric acid with cupric oxide or with copper metal. (b) The ingredient must be of a...

  18. Heritability and clinical determinants of serum indoxyl sulfate and p-cresyl sulfate, candidate biomarkers of the human microbiome enterotype.

    Directory of Open Access Journals (Sweden)

    Liesbeth Viaene

    Full Text Available BACKGROUND: Indoxyl sulfate and p-cresyl sulfate are unique microbial co-metabolites. Both co-metabolites have been involved in the pathogenesis of accelerated cardiovascular disease and renal disease progression. Available evidence suggests that indoxyl sulfate and p-cresyl sulfate may be considered candidate biomarkers of the human enterotype and may help to explain the link between diet and cardiovascular disease burden. OBJECTIVE AND DESIGN: Information on clinical determinants and heritability of indoxyl sulfate and p-cresyl sulfate serum is non-existing. To clarify this issue, the authors determined serum levels of indoxyl sulfate and p-cresyl sulfate in 773 individuals, recruited in the frame of the Flemish Study on Environment, Genes and Health Outcomes (FLEMENGHO study. RESULTS: Serum levels of indoxyl sulfate and p-cresyl sulfate amounted to 3.1 (2.4-4.3 and 13.0 (7.4-21.5 μM, respectively. Regression analysis identified renal function, age and sex as independent determinants of both co-metabolites. Both serum indoxyl sulfate (h2 = 0.17 and p-cresyl sulfate (h2 = 0.18 concentrations showed moderate but significant heritability after adjustment for covariables, with significant genetic and environmental correlations for both co-metabolites. LIMITATIONS: Family studies cannot provide conclusive evidence for a genetic contribution, as confounding by shared environmental effects can never be excluded. CONCLUSIONS: The heritability of indoxyl sulfate and p-cresyl sulfate is moderate. Besides genetic host factors and environmental factors, also renal function, sex and age influence the serum levels of these co-metabolites.

  19. Vibrational spectra and crystal lattice dynamics of hexahydrates of zinc potassium and ammonium sulfates

    Science.gov (United States)

    Barashkov, M. V.; Komyak, A. I.; Shashkov, S. N.

    2000-03-01

    The IR spectra and polarized Raman spectra of crystals of hexahydrates of zinc potassium and ammonium sulfates have been obtained experimentally at 93 K and at room temperature. The frequencies and modes of normal vibrations of the octahedral complex [Zn(H2O)6]2+ have been calculated. The assignment of the observed lines of the internal and external vibrations of the crystal cell has been made by calculations and by factor-group analysis.

  20. The electrical and thermal properties of sodium sulfate mixed with lithium sulfate, yttrium sulfate, and silicon dioxide

    International Nuclear Information System (INIS)

    Imanaka, N.; Yamaguchi, Y.; Adachi, G.; Shiokawa, J.

    1986-01-01

    Sodium sulfate mixed with lithium sulfate, yttrium sulfate, and silicon dioxide was prepared. The thermal and electrical properties of its phases were investigated. The Na 2 SO 4 -Li 2 SO 4 -Y 2 (SO 4 ) 3 SiO 2 samples are similar to the Na 2 SO 4 -I phase (a high temperature phase), which is appreciably effective for Na + ionic conduction. Phase transformation was considerably suppressed by mixing. Electromotive force (EMF) was measured, using Na 2 SO 4 -Li 2 SO 4 -Y 2 (SO 4 ) 3 -SiO 2 as a solid electrolyte, by constructing an SO 2 gas concentration cell. The measured EMF's at 823 and 773 K were in fairly good accordance with the calculated EMF's for inlet SO 2 gas concentration between 30 ppm and 1%, and 500 ppm and 0.5% respectively

  1. 21 CFR 172.822 - Sodium lauryl sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Sodium lauryl sulfate. 172.822 Section 172.822 Food... Multipurpose Additives § 172.822 Sodium lauryl sulfate. The food additive sodium lauryl sulfate may be safely... specifications: (1) It is a mixture of sodium alkyl sulfates consisting chiefly of sodium lauryl sulfate [CH2(CH2...

  2. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  3. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  4. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  5. Purification and sequence characterization of chondroitin sulfate and dermatan sulfate from fishes.

    Science.gov (United States)

    Lin, Na; Mo, Xiaoli; Yang, Yang; Zhang, Hong

    2017-04-01

    Chondroitin sulfate (CS) and dermatan sulfate (DS) were extracted and purified from skins or bones of salmon (Salmo salar), snakehead (Channa argus), monkfish (Lophius litulon) and skipjack tuna (Katsuwonus pelamis). Size, structural sequences and sulfate groups of oligosaccharides in the purified CS and DS could be characterized and identified using high performance liquid chromatography (HPLC) combined with Orbitrap mass spectrometry. CS and DS chain structure varies depending on origin, but motif structure appears consistent. Structures of CS and DS oligosaccharides with different size and sulfate groups were compared between fishes and other animals, and results showed that some minor differences of special structures could be identified by hydrophilic interaction chromatography-liquid chromatography-fourier transform-mass/mass spectrometry (HILIC-LC-FT-MS/MS). For example, data showed that salmon and skipjack CS had a higher percentage content of high-level sulfated oligosaccharides than that porcine CS. In addition, structural information of different origins of CS and DS was analyzed by principal component analysis (PCA) and results showed that CS and DS samples could be differentiated according to their molecular conformation and oligosaccharide fragments information. Understanding CS and DS structure derived from different origins may lead to the production of CS or DS with unique disaccharides or oligosaccharides sequence composition and biological functions.

  6. Sulfur-oxidizing autotrophic and mixotrophic denitrification processes for drinking water treatment: elimination of excess sulfate production and alkalinity requirement.

    Science.gov (United States)

    Sahinkaya, Erkan; Dursun, Nesrin

    2012-09-01

    This study evaluated the elimination of alkalinity need and excess sulfate generation of sulfur-based autotrophic denitrification process by stimulating simultaneous autotrophic and heterotrophic (mixotrophic) denitrification process in a column bioreactor by methanol supplementation. Also, denitrification performances of sulfur-based autotrophic and mixotrophic processes were compared. In autotrophic process, acidity produced by denitrifying sulfur-oxidizing bacteria was neutralized by the external NaHCO(3) supplementation. After stimulating mixotrophic denitrification process, the alkalinity need of the autotrophic process was satisfied by the alkalinity produced by heterotrophic denitrifiers. Decreasing and lastly eliminating the external alkalinity supplementation did not adversely affect the process performance. Complete denitrification of 75 mg L(-1) NO(3)-N under mixotrophic conditions at 4 h hydraulic retention time was achieved without external alkalinity supplementation and with effluent sulfate concentration lower than the drinking water guideline value of 250 mg L(-1). The denitrification rate of mixotrophic process (0.45 g NO(3)-N L(-1) d(-1)) was higher than that of autotrophic one (0.3 g NO(3)-N L(-1) d(-1)). Batch studies showed that the sulfur-based autotrophic nitrate reduction rate increased with increasing initial nitrate concentration and transient accumulation of nitrite was observed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Treatment and electricity harvesting from sulfate/sulfide-containing wastewaters using microbial fuel cell with enriched sulfate-reducing mixed culture

    International Nuclear Information System (INIS)

    Lee, Duu-Jong; Lee, Chin-Yu; Chang, Jo-Shu

    2012-01-01

    Highlights: ► We started up microbial fuel cell (MFC) using enriched sulfate-reducing mixed culture. ► Sulfate-reducing bacteria and anode-respiring bacteria were enriched in anodic biofilms. ► The MFC effectively remove sulfate to elementary sulfur in the presence of lactate. ► The present device can treat sulfate laden wastewaters with electricity harvesting. - Abstract: Anaerobic treatment of sulfate-laden wastewaters can produce excess sulfide, which is corrosive to pipelines and is toxic to incorporated microorganisms. This work started up microbial fuel cell (MFC) using enriched sulfate-reducing mixed culture as anodic biofilms and applied the so yielded MFC for treating sulfate or sulfide-laden wastewaters. The sulfate-reducing bacteria in anodic biofilm effectively reduced sulfate to sulfide, which was then used by neighboring anode respiring bacteria (ARB) as electron donor for electricity production. The presence of organic carbons enhanced MFC performance since the biofilm ARB were mixotrophs that need organic carbon to grow. The present device introduces a route for treating sulfate laden wastewaters with electricity harvesting.

  8. Treatment and electricity harvesting from sulfate/sulfide-containing wastewaters using microbial fuel cell with enriched sulfate-reducing mixed culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Duu-Jong, E-mail: cedean@mail.ntust.edu.tw [Department of Chemical Engineering, National Taiwan University, Taipei, Taiwan (China); Department of Chemical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan (China); Lee, Chin-Yu [Department of Chemical Engineering, National Taiwan University, Taipei, Taiwan (China); Chang, Jo-Shu [Department of Chemical Engineering, National Cheng Kung University, Tainan, Taiwan (China); Center for Bioscience and Biotechnology, National Cheng Kung University, Tainan, Taiwan (China); Research Center for Energy Technology and Strategy, National Cheng Kung University, Tainan, Taiwan (China)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer We started up microbial fuel cell (MFC) using enriched sulfate-reducing mixed culture. Black-Right-Pointing-Pointer Sulfate-reducing bacteria and anode-respiring bacteria were enriched in anodic biofilms. Black-Right-Pointing-Pointer The MFC effectively remove sulfate to elementary sulfur in the presence of lactate. Black-Right-Pointing-Pointer The present device can treat sulfate laden wastewaters with electricity harvesting. - Abstract: Anaerobic treatment of sulfate-laden wastewaters can produce excess sulfide, which is corrosive to pipelines and is toxic to incorporated microorganisms. This work started up microbial fuel cell (MFC) using enriched sulfate-reducing mixed culture as anodic biofilms and applied the so yielded MFC for treating sulfate or sulfide-laden wastewaters. The sulfate-reducing bacteria in anodic biofilm effectively reduced sulfate to sulfide, which was then used by neighboring anode respiring bacteria (ARB) as electron donor for electricity production. The presence of organic carbons enhanced MFC performance since the biofilm ARB were mixotrophs that need organic carbon to grow. The present device introduces a route for treating sulfate laden wastewaters with electricity harvesting.

  9. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  10. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  11. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  12. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  13. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  14. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  15. Isolation of a sulfate reducing bacterium and its application in sulfate ...

    African Journals Online (AJOL)

    The results show that the effect of C. freundii in removing sulfate was best when the temperature was 32°C, pH was 7.0, COD/SO42- was 5.0 and the initial SO42- concentration was 1500 mg/L. Also, the SRB was inoculated onto an up-flow anaerobic sludge bed (UASB) to remove sulfate in actual tannery wastewater.

  16. Divergent Synthesis of Chondroitin Sulfate Disaccharides and Identification of Sulfate Motifs that Inhibit Triple Negative Breast Cancer

    Science.gov (United States)

    Wei Poh, Zhong; Heng Gan, Chin; Lee, Eric J.; Guo, Suxian; Yip, George W.; Lam, Yulin

    2015-09-01

    Glycosaminoglycans (GAGs) regulate many important physiological processes. A pertinent issue to address is whether GAGs encode important functional information via introduction of position specific sulfate groups in the GAG structure. However, procurement of pure, homogenous GAG motifs to probe the “sulfation code” is a challenging task due to isolation difficulty and structural complexity. To this end, we devised a versatile synthetic strategy to obtain all the 16 theoretically possible sulfation patterns in the chondroitin sulfate (CS) repeating unit; these include rare but potentially important sulfated motifs which have not been isolated earlier. Biological evaluation indicated that CS sulfation patterns had differing effects for different breast cancer cell types, and the greatest inhibitory effect was observed for the most aggressive, triple negative breast cancer cell line MDA-MB-231.

  17. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  18. Metabolic Flexibility of Sulfate Reducing Bacteria

    Directory of Open Access Journals (Sweden)

    Caroline M. Plugge

    2011-05-01

    Full Text Available Dissimilatory sulfate-reducing prokaryotes (SRB are a very diverse group of anaerobic bacteria that are omnipresent in nature and play an imperative role in the global cycling of carbon and sulfur. In anoxic marine sediments sulfate reduction accounts for up to 50% of the entire organic mineralization in coastal and shelf ecosystems where sulfate diffuses several meters deep into the sediment. As a consequence, SRB would be expected in the sulfate-containing upper sediment layers, whereas methanogenic Archaea would be expected to succeed in the deeper sulfate-depleted layers of the sediment. Where sediments are high in organic matter, sulfate is depleted at shallow sediment depths, and biogenic methane production will occur. In the absence of sulfate, many SRB ferment organic acids and alcohols, producing hydrogen, acetate, and carbon dioxide, and may even rely on hydrogen- and acetate-scavenging methanogens to convert organic compounds to methane. SRB can establish two different life styles, and these can be termed as sulfidogenic and acetogenic, hydrogenogenic metabolism. The advantage of having different metabolic capabilities is that it raises the chance of survival in environments when electron acceptors become depleted. In marine sediments, SRB and methanogens do not compete but rather complement each other in the degradation of organic matter.Also in freshwater ecosystems with sulfate concentrations of only 10-200 μM, sulfate is consumed efficiently within the top several cm of the sediments. Here, many of the δ-Proteobacteria present have the genetic machinery to perform dissimilatory sulfate reduction, yet they have an acetogenic, hydrogenogenic way of life.In this review we evaluate the physiology and metabolic mode of SRB in relation with their environment.

  19. 2-Amino-4-hydroxyethylaminoanisole sulfate

    DEFF Research Database (Denmark)

    Madsen, Jakob T; Andersen, Klaus E

    2016-01-01

    positive patch test reactions to the coupler 2-amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014. METHODS: Patch test results from the Allergen Bank database for eczema patients patch tested with 2-amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014 were reviewed. RESULTS......: A total of 902 dermatitis patients (154 from the dermatology department and 748 from 65 practices) were patch tested with amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014. Thirteen (1.4%) patients had a positive patch test reaction. Our results do not indicate irritant reactions....... CONCLUSIONS: 2-Amino-4-hydroxyethylaminoanisole sulfate is a new but rare contact allergen....

  20. Holothurian Fucosylated Chondroitin Sulfate

    Directory of Open Access Journals (Sweden)

    Vitor H. Pomin

    2014-01-01

    Full Text Available Fucosylated chondroitin sulfate (FucCS is a structurally distinct glycosaminoglycan found in sea cucumber species. It has the same backbone composition of alternating 4-linked glucuronic acid and 3-linked N-acetyl galactosamine residues within disaccharide repeating units as regularly found in mammalian chondroitin sulfates. However, FucCS has also sulfated fucosyl branching units 3-O-linked to the acid residues. The sulfation patterns of these branches vary accordingly with holothurian species and account for different biological actions and responses. FucCSs may exhibit anticoagulant, antithrombotic, anti-inflammatory, anticancer, antiviral, and pro-angiogenic activities, besides its beneficial effects in hemodialysis, cellular growth modulation, fibrosis and hyperglycemia. Through an historical overview, this document covers most of the science regarding the holothurian FucCS. Both structural and medical properties of this unique GAG, investigated during the last 25 years, are systematically discussed herein.

  1. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  2. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. A multi-analytical approach to better assess the keratan sulfate contamination in animal origin chondroitin sulfate

    Energy Technology Data Exchange (ETDEWEB)

    Restaino, Odile Francesca, E-mail: odilefrancesca.restaino@unina2.it [Department of Experimental Medicine, Section of Biotechnology and Molecular Biology, University of Campania-L.Vanvitelli, ex Second University of Naples, Via De Crecchio 7, 80138, Naples (Italy); Finamore, Rosario, E-mail: rosario.finamore@unina2.it [Department of Experimental Medicine, Section of Biotechnology and Molecular Biology, University of Campania-L.Vanvitelli, ex Second University of Naples, Via De Crecchio 7, 80138, Naples (Italy); Diana, Paola, E-mail: paola.diana@unina2.it [Department of Experimental Medicine, Section of Biotechnology and Molecular Biology, University of Campania-L.Vanvitelli, ex Second University of Naples, Via De Crecchio 7, 80138, Naples (Italy); Marseglia, Mariacarmela, E-mail: marimars84@hotmail.it [Department of Experimental Medicine, Section of Biotechnology and Molecular Biology, University of Campania-L.Vanvitelli, ex Second University of Naples, Via De Crecchio 7, 80138, Naples (Italy); Vitiello, Mario, E-mail: mariovitiello.ita@gmail.com [Department of Experimental Medicine, Section of Biotechnology and Molecular Biology, University of Campania-L.Vanvitelli, ex Second University of Naples, Via De Crecchio 7, 80138, Naples (Italy); Casillo, Angela, E-mail: angela.casillo@unina.it [Department of Chemical Sciences, University of Naples Federico II, Complesso Universitario Monte S. Angelo, Via Cintia 4, 80126, Naples (Italy); Bedini, Emiliano, E-mail: emiliano.bedini@unina.it [Department of Chemical Sciences, University of Naples Federico II, Complesso Universitario Monte S. Angelo, Via Cintia 4, 80126, Naples (Italy); Parrilli, Michelangelo, E-mail: michelangelo.parrilli@unina.it [Department of Biology, University of Naples Federico II, Complesso Universitario Monte S. Angelo, Via Cintia 4, 80126, Naples (Italy); and others

    2017-03-15

    Chondroitin sulfate is a glycosaminoglycan widely used as active principle of anti-osteoarthritis drugs and nutraceuticals, manufactured by extraction from animal cartilaginous tissues. During the manufacturing procedures, another glycosaminoglycan, the keratan sulfate, might be contemporarily withdrawn, thus eventually constituting a contaminant difficult to be determined because of its structural similarity. Considering the strict regulatory rules on the pureness of pharmaceutical grade chondrotin sulfate there is an urgent need and interest to determine the residual keratan sulfate with specific, sensitive and reliable methods. To pursue this aim, in this paper, for the first time, we set up a multi-analytical and preparative approach based on: i) a newly developed method by high performance anion-exchange chromatography with pulsed amperometric detection, ii) gas chromatography-mass spectrometry analyses, iii) size exclusion chromatography analyses coupled with triple detector array module and on iv) strong anion exchange chromatography separation. Varied KS percentages, in the range from 0.1 to 19.0% (w/w), were determined in seven pharmacopeia and commercial standards and nine commercial samples of different animal origin and manufacturers. Strong anion exchange chromatography profiles of the samples showed three or four different peaks. These peaks analyzed by high performance anion-exchange with pulsed amperometric detection and size exclusion chromatography with triple detector array, ion chromatography and by mono- or two-dimensional nuclear magnetic resonance revealed a heterogeneous composition of both glycosaminoglycans in terms of sulfation grade and molecular weight. High molecular weight species (>100 KDa) were also present in the samples that counted for chains still partially linked to a proteoglycan core. - Highlights: • A multi-analytical approach was set up, for the first time, for the determination of the residual keratan sulfate

  5. A multi-analytical approach to better assess the keratan sulfate contamination in animal origin chondroitin sulfate

    International Nuclear Information System (INIS)

    Restaino, Odile Francesca; Finamore, Rosario; Diana, Paola; Marseglia, Mariacarmela; Vitiello, Mario; Casillo, Angela; Bedini, Emiliano; Parrilli, Michelangelo

    2017-01-01

    Chondroitin sulfate is a glycosaminoglycan widely used as active principle of anti-osteoarthritis drugs and nutraceuticals, manufactured by extraction from animal cartilaginous tissues. During the manufacturing procedures, another glycosaminoglycan, the keratan sulfate, might be contemporarily withdrawn, thus eventually constituting a contaminant difficult to be determined because of its structural similarity. Considering the strict regulatory rules on the pureness of pharmaceutical grade chondrotin sulfate there is an urgent need and interest to determine the residual keratan sulfate with specific, sensitive and reliable methods. To pursue this aim, in this paper, for the first time, we set up a multi-analytical and preparative approach based on: i) a newly developed method by high performance anion-exchange chromatography with pulsed amperometric detection, ii) gas chromatography-mass spectrometry analyses, iii) size exclusion chromatography analyses coupled with triple detector array module and on iv) strong anion exchange chromatography separation. Varied KS percentages, in the range from 0.1 to 19.0% (w/w), were determined in seven pharmacopeia and commercial standards and nine commercial samples of different animal origin and manufacturers. Strong anion exchange chromatography profiles of the samples showed three or four different peaks. These peaks analyzed by high performance anion-exchange with pulsed amperometric detection and size exclusion chromatography with triple detector array, ion chromatography and by mono- or two-dimensional nuclear magnetic resonance revealed a heterogeneous composition of both glycosaminoglycans in terms of sulfation grade and molecular weight. High molecular weight species (>100 KDa) were also present in the samples that counted for chains still partially linked to a proteoglycan core. - Highlights: • A multi-analytical approach was set up, for the first time, for the determination of the residual keratan sulfate

  6. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  7. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  8. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  9. Comparison of magnesium sulfate and sodium sulfate for removal of water from pesticide extracts of foods.

    Science.gov (United States)

    Schenck, Frank J; Callery, Patrick; Gannett, Peter M; Daft, Jonathan R; Lehotay, Steven J

    2002-01-01

    Water-miscible solvents, such as acetone and acetonitrile, effectively extract both polar and nonpolar pesticide residues from nonfatty foods. The addition of sodium chloride to the resulting acetonitrile-water or acetone-water extract (salting out) results in the separation of the water from the organic solvent. However, the organic solvent layer (pesticide extract) still contains some residual water, which can adversely affect separation procedures that follow, such as solid-phase extraction and/or gas chromatography. Drying agents, such as sodium sulfate or magnesium sulfate, are used to remove the water from the organic extracts. In the present study, we used nuclear magnetic resonance spectroscopy to study the composition of the phases resulting from salting out and to compare the effectiveness of sodium sulfate and magnesium sulfate as drying agents. The study showed that considerable amounts of water remained in the organic phase after phase separation. Sodium sulfate was a relatively ineffective drying agent, removing little or no residual water from the organic solvent. Magnesium sulfate proved to be a much more effective drying agent.

  10. Modeling of sulfation of potassium chloride by ferric sulfate addition during grate-firing of biomass

    DEFF Research Database (Denmark)

    Wu, Hao; Jespersen, Jacob Boll; Aho, Martti

    2013-01-01

    Potassium chloride, KCl, formed from critical ash-forming elements released during combustion may lead to severe ash deposition and corrosion problems in biomass-fired boilers. Ferric sulfate, Fe2(SO4)3 is an effective additive, which produces sulfur oxides (SO2 and SO3) to convert KCl to the less...... harmful K2SO4. In the present study the decomposition of ferric sulfate is studied in a fast-heating rate thermogravimetric analyzer (TGA), and a kinetic model is proposed to describe the decomposition process. The yields of SO2 and SO3 from ferric sulfate decomposition are investigated in a laboratory......-scale tube reactor. It is revealed that approximately 40% of the sulfur is released as SO3, the remaining fraction being released as SO2. The proposed decomposition model of ferric sulfate is combined with a detailed gas phase kinetic model of KCl sulfation, and a simplified model of K2SO4 condensation...

  11. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  12. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  13. Using discriminant analysis to detect intrusions in external communication for self-driving vehicles

    Directory of Open Access Journals (Sweden)

    Khattab M.Ali Alheeti

    2017-08-01

    Full Text Available Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS and black hole attacks on vehicular ad hoc networks (VANETs. The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA and Quadratic Discriminant Analysis (QDA which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection.

  14. Bactericide for sulfate-reducing bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Shklyar, T F; Anoshina, G M; Blokhin, V Ye; Kisarrev, Ye L; Novikovsa, G M

    1981-01-01

    The aim of the invention is to find a bactericide for sulfate-reducing bacteria of oil fields in Western Siberia in order to suppress the biocorrosive activity on oil industry equipment. This goal is achieved by using M-nitroacetanylide as the bactericide of sulfate-reducing bacteria. This agent suppresses the activity of a stored culture of sulfate-reducing bacteria that comes from industrial waste waters injection wells of the Smotlor oil field.

  15. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  16. Inter vs. intraglycosidic acetal linkages control sulfation pattern in semi-synthetic chondroitin sulfate.

    Science.gov (United States)

    Laezza, Antonio; De Castro, Cristina; Parrilli, Michelangelo; Bedini, Emiliano

    2014-11-04

    Microbial-sourced unsulfated chondroitin could be converted into chondroitin sulfate (CS) polysaccharide by a multi-step strategy relying upon benzylidenation and acetylation reactions as key-steps for its regioselective protection. By conducting the two reactions one- or two-pots, CSs with different sulfation patterns could be obtained at the end of the semi-synthesis. In particular, a CS polysaccharide possessing sulfate groups randomly distributed between positions 4 and 6 of N-acetyl-galactosamine (GalNAc) units could be obtained through the two-pots route, whereas the one-pot pathway allowed an additional sulfation at position 3 of some glucuronic acid (GlcA) units. This difference was ascribed to the stabilization of a labile interglycosidic benzylidene acetal involving positions O-3 and O-6 of some GlcA and GalNAc, respectively, when the benzylidene-acetylation reactions were conducted in a one-pot fashion. Isolation and characterization of a polysaccharide intermediate showing interglycosidic acetal moieties was accomplished. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  18. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  19. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  1. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. 21 CFR 582.5443 - Magnesium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Magnesium sulfate. 582.5443 Section 582.5443 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Supplements 1 § 582.5443 Magnesium sulfate. (a) Product. Magnesium sulfate. (b) Conditions of use. This...

  4. 21 CFR 582.5230 - Calcium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Calcium sulfate. 582.5230 Section 582.5230 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Supplements 1 § 582.5230 Calcium sulfate. (a) Product. Calcium sulfate. (b) Conditions of use. This substance...

  5. 21 CFR 582.1125 - Aluminum sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Aluminum sulfate. 582.1125 Section 582.1125 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Additives § 582.1125 Aluminum sulfate. (a) Product. Aluminum sulfate. (b) Conditions of use. This substance...

  6. 21 CFR 182.1125 - Aluminum sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Aluminum sulfate. 182.1125 Section 182.1125 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR... Substances § 182.1125 Aluminum sulfate. (a) Product. Aluminum sulfate. (b) Conditions of use. This substance...

  7. Sulfation pattern of fucose branches affects the anti-hyperlipidemic activities of fucosylated chondroitin sulfate.

    Science.gov (United States)

    Wu, Nian; Zhang, Yu; Ye, Xingqian; Hu, Yaqin; Ding, Tian; Chen, Shiguo

    2016-08-20

    Fucosylated chondroitin sulfates (fCSs) are glycosaminoglycans extracted from sea cucumbers, consisting of chondroitin sulfate E (CSE) backbones and sulfated fucose branches. The biological properties of fCSs could be affected by the sulfation pattern of their fucose branches. In the present study, two fCSs were isolated from sea cucumbers Isostichopus badionotus (fCS-Ib) and Pearsonothuria graeffei (fCS-Pg). Their monosaccharide compositions of glucuronic acid (GlcA), N-acetylgalactosamine (GalNAc), fucose (Fuc) and sulfate were at similar molar ratio with 1.0/0.7/0.9/3.1 for fCS-Ib and 1.0/0.8/1.5/2.6 for fCS-Pg. The two fCSs have different sulfation patterns on their fucose branches, fCS-Pg with 3,4-O-disulfation while fCS-Ib with 2,4-O-disulfation. Their antihyperlipidemic effects were compared using a high-fat high-fructose diet (HFFD)-fed C57BL/6J mice model. Both fCS-Ib and fCS-Pg had significant effects on lipid profile improvement, liver protection, blood glucose diminution and hepatic glycogen synthesis. Specifically, fCS-Pg with 3,4-O-disulfation fucose branches was more effective in reduction of blood cholesterol (TC), low density lipoprotein (LDL) and atherogenic index (AI). Our results indicate that both fCSs, especially fCS-Pg, could be used as a potential anti-hyperlipidemic drug. Copyright © 2016. Published by Elsevier Ltd.

  8. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  9. Atrial fibrillation detected by external loop recording for seven days or two-day simultaneous Holter recording: A comparison in patients with ischemic stroke or transient ischemic attack.

    Science.gov (United States)

    Sejr, Michala Herskind; Nielsen, Jens Cosedis; Damgaard, Dorte; Sandal, Birgitte Forsom; May, Ole

    Atrial fibrillation (AF) is the most common cardiac cause of ischemic stroke and transient ischemic attack (IS/TIA). To compare the diagnostic value of seven-day external loop recording (ELR) and two-day Holter recording for detecting AF after IS/TIA. 191 IS/TIA patients without AF history. Endpoint was AF >30s. We started two-day Holter recording and seven-day ELR simultaneously. Seven-day ELR and two-day Holter recording detected the same three AF patients. ELR detected another six patients with AF adjudicated by cardiologists, four detections after Holter (3 vs. 7, p=0.125) and two false-positive detections during Holter. Seven-day ELR automatically classified 50/191 patients (26%) with AF, but only 7/50 (14%) were confirmed as AF by cardiologists. Seven-day ELR did not detect significantly more patients with AF than two-day Holter recording. 86% of patients with ELR-classified AF were false positives, indicating a poor performance of the automatic AF detection algorithm used. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  11. Effect of barium sulfate contrast medium on rheology and sensory texture attributes in a model food.

    Science.gov (United States)

    Ekberg, O; Bulow, M; Ekman, S; Hall, G; Stading, M; Wendin, K

    2009-03-01

    The swallowing process can be visualized using videoradiography, by mixing food with contrast medium, e.g., barium sulfate (BaSO(4)), making it radiopaque. The sensory properties of foods may be affected by adding this medium. To evaluate if and to what extent sensory and rheological characteristics of mango purée were altered by adding barium sulfate to the food. This study evaluated four food samples based on mango purée, with no or added barium sulfate contrast medium (0%, 12.5%, 25.0%, and 37.5%), by a radiographic method, and measured sensory texture properties and rheological characteristics. The sensory evaluation was performed by an external trained panel using quantitative descriptive analysis. The ease of swallowing the foods was also evaluated. The sensory texture properties of mango purée were significantly affected by the added barium in all evaluated attributes, as was the perception of particles. Moreover, ease of swallowing was significantly higher in the sample without added contrast medium. All samples decreased in extensional viscosity with increasing extension rate, i.e., all samples were tension thinning. Shear viscosity was not as dependent on the concentration of BaSO(4) as extensional viscosity. Addition of barium sulfate to a model food of mango purée has a major impact on perceived sensory texture attributes as well as on rheological parameters.

  12. 21 CFR 524.1484e - Neomycin sulfate and polymyxin B sulfate ophthalmic solution.

    Science.gov (United States)

    2010-04-01

    ... ophthalmic solution. 524.1484e Section 524.1484e Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS OPHTHALMIC AND TOPICAL DOSAGE FORM NEW ANIMAL DRUGS § 524.1484e Neomycin sulfate and polymyxin B sulfate ophthalmic solution. (a...

  13. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  14. Galactose 6-sulfate sulfatase activity in Morquio syndrome

    International Nuclear Information System (INIS)

    Yutaka, T.; Okada, S.; Kato, T.; Inui, K.; Yabuuhi, H.

    1982-01-01

    The authors have prepared a new substrate, o-β-D-sulfo-galactosyl-(1-4)-β-D-6-sulfo-2-acetamido-2-deoxyglucosyl-(1-4)-D-[1- 3 H]galactitol, from shark cartilage keratan sulfate, for the assay of galactose 6-sulfate sulfatase activity. Using this substrate, they found there was a striking deficiency of galactose 6-sulfate sulfatase activity, in addition to the known deficiency of N-acetylgalactosamine 6-sulfate sulfatase, in the cultured skin fibroblasts of patients with Morquio syndrome. Their results could be explained by the hypothesis that accumulation of keratan sulfate and chondroitin 6-sulfate in Morquio syndrome is due to a deficiency of galactose 6-sulfate sulfatase and N-acetylgalactosamine 6-sulfate sulfatase activity, which are necessary for the degradation of these two mucopolysaccharides. (Auth.)

  15. Galactose 6-sulfate sulfatase activity in Morquio syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Yutaka, T.; Okada, S.; Kato, T.; Inui, K.; Yabuuhi, H. (Osaka Univ. (Japan). Faculty of Medicine)

    1982-07-01

    The authors have prepared a new substrate, o-..beta..-D-sulfo-galactosyl-(1-4)-..beta..-D-6-sulfo-2-acetamido-2-deoxyglucosyl-(1-4)-D-(1-/sup 3/H)galactitol, from shark cartilage keratan sulfate, for the assay of galactose 6-sulfate sulfatase activity. Using this substrate, they found there was a striking deficiency of galactose 6-sulfate sulfatase activity, in addition to the known deficiency of N-acetylgalactosamine 6-sulfate sulfatase, in the cultured skin fibroblasts of patients with Morquio syndrome. Their results could be explained by the hypothesis that accumulation of keratan sulfate and chondroitin 6-sulfate in Morquio syndrome is due to a deficiency of galactose 6-sulfate sulfatase and N-acetylgalactosamine 6-sulfate sulfatase activity, which are necessary for the degradation of these two mucopolysaccharides.

  16. 21 CFR 184.1643 - Potassium sulfate.

    Science.gov (United States)

    2010-04-01

    ... hydroxide or potassium carbonate. (b) The ingredient meets the specifications of the “Food Chemicals Codex... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Potassium sulfate. 184.1643 Section 184.1643 Food... Specific Substances Affirmed as GRAS § 184.1643 Potassium sulfate. (a) Potassium sulfate (K2SO4, CAS Reg...

  17. Hydrometallurgical process for recovering iron sulfate and zinc sulfate from baghouse dust

    Science.gov (United States)

    Zaromb, Solomon; Lawson, Daniel B.

    1994-01-01

    A process for recovering zinc/rich and iron-rich fractions from the baghouse dust that is generated in various metallurgical operations, especially in steel-making and other iron-making plants, comprises the steps of leaching the dust by hot concentrated sulfuric acid so as to generate dissolved zinc sulfate and a precipitate of iron sulfate, separating the precipitate from the acid by filtration and washing with a volatile liquid, such as methanol or acetone, and collecting the filtered acid and the washings into a filtrate fraction. The volatile liquid may be recovered distillation, and the zinc may be removed from the filtrate by alternative methods, one of which involves addition of a sufficient amount of water to precipitate hydrated zinc sulfate at 10.degree. C., separation of the precipitate from sulfuric acid by filtration, and evaporation of water to regenerate concentrated sulfuric acid. The recovery of iron may also be effected in alternative ways, one of which involves roasting the ferric sulfate to yield ferric oxide and sulfur trioxide, which can be reconverted to concentrated sulfuric acid by hydration. The overall process should not generate any significant waste stream.

  18. The ceric sulfate dosimeter

    DEFF Research Database (Denmark)

    Bjergbakke, Erling

    1970-01-01

    The process employed for the determination of absorbed dose is the reduction of ceric ions to cerous ions in a solution of ceric sulfate and cerous sulfate in 0.8N sulfuric acid: Ce4+→Ce 3+ The absorbed dose is derived from the difference in ceric ion concentration before and after irradiation...

  19. Lack of effect of zinc sulfate on wheezing after bronchiolitis in infants less than two years

    Directory of Open Access Journals (Sweden)

    R Abasi

    2014-10-01

    Full Text Available Backgrounds & aim: Wheezing after bronchiolitis is known as a risk factor for asthma. No cure or effective vaccine has been identified for such disease. The purpose of this study was to determine the effects of zinc sulfate on persistent wheezing after bronchiolitis in infants less than two years. Methods: The present randomized clinical trial study was conducted on 90 infants under two years of age suffering from the first attack with a clinical diagnosis of bronchiolitis wheezing hospitalized in Imam Sajjad Hospital, Yasuj. All infants were equally placed in test groups and control group. In addition to bronchiolitis usual treatment, test group received 20 mg of elemental zinc for seven days. Patient information including risk factors associated with wheezing and persistent wheezing were compared 48 hours and two weeks after treatment. Data were analyzed using chi-square and t tests. Results: In all 90 infants diagnosed with bronchiolitis, wheezing was observed. After 48 hours and two weeks wheezing was continued in 67 patients (74.4% and 54 patients (60% respectively Conclusion: The results showed Zinc sulfate had no effect on the improvement of wheezing after bronchiolitis.

  20. 21 CFR 184.1443 - Magnesium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Magnesium sulfate. 184.1443 Section 184.1443 Food... Specific Substances Affirmed as GRAS § 184.1443 Magnesium sulfate. (a) Magnesium sulfate (MgSO4·7H2O, CAS... magnesium oxide, hydroxide, or carbonate with sulfuric acid and evaporating the solution to crystallization...

  1. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  2. Regeneration of sulfated metal oxides and carbonates

    Science.gov (United States)

    Hubble, Bill R.; Siegel, Stanley; Cunningham, Paul T.

    1978-03-28

    Alkali metal or alkaline earth metal carbonates such as calcium carbonate and magnesium carbonate found in dolomite or limestone are employed for removal of sulfur dioxide from combustion exhaust gases. The sulfated carbonates are regenerated to oxides through use of a solid-solid reaction, particularly calcium sulfide with calcium sulfate to form calcium oxide and sulfur dioxide gas. The regeneration is performed by contacting the sulfated material with a reductant gas such as hydrogen within an inert diluent to produce calcium sulfide in mixture with the sulfate under process conditions selected to permit the sulfide-sulfate, solid-state reaction to occur.

  3. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  4. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  5. Sulfation in lead-acid batteries

    Science.gov (United States)

    Catherino, Henry A.; Feres, Fred F.; Trinidad, Francisco

    Virtually, all military land vehicle systems use a lead-acid battery to initiate an engine start. The maintainability of these batteries and as a consequence, system readiness, has suffered from a lack of understanding of the reasons for battery failure. Often, the term most commonly heard for explaining the performance degradation of lead-acid batteries is the word, sulfation. Sulfation is a residual term that came into existence during the early days of lead-acid battery development. The usage is part of the legend that persists as a means for interpreting and justifying the eventual performance deterioration and failure of lead-acid batteries. The usage of this term is confined to the greater user community and, over time, has encouraged a myriad of remedies for solving sulfation problems. One can avoid the connotations associated with the all-inclusive word, sulfation by visualizing the general "sulfation" effect in terms of specific mechanistic models. Also, the mechanistic models are essential for properly understanding the operation and making proper use this battery system. It is evident that the better the model, the better the level of understanding.

  6. Heparan sulfate and cell division

    Directory of Open Access Journals (Sweden)

    Porcionatto M.A.

    1999-01-01

    Full Text Available Heparan sulfate is a component of vertebrate and invertebrate tissues which appears during the cytodifferentiation stage of embryonic development. Its structure varies according to the tissue and species of origin and is modified during neoplastic transformation. Several lines of experimental evidence suggest that heparan sulfate plays a role in cellular recognition, cellular adhesion and growth control. Heparan sulfate can participate in the process of cell division in two distinct ways, either as a positive or negative modulator of cellular proliferation, or as a response to a mitogenic stimulus.

  7. Sulfate and dissolved sulfide variation under low COD/Sulfate ratio in Up-flow Anaerobic Sludge Blanket (UASB treating domestic wastewater

    Directory of Open Access Journals (Sweden)

    Sérvio Túlio Alves Cassini

    2012-04-01

    Full Text Available In this study, the dynamics of sulfate reduction and dissolved sulfide generation (S2-, HS-, H2Saq in liquid phase was evaluated in an UASB reactor treating domestic wastewater with low COD/Sulfate content. The evaluation in the UASB reactor was performed at three sludge heights (0.25, 1.25, 2.25 taps and effluent of the reactor. Sulfate reduction was verified in the reactor, with an average reduction of 24 % throughout the experiment period. However, the dissolved sulfide concentration in the reactor was not higher than 5.0 mg Sdiss/L. The kinetic model of first order showed good fit to describe the sulfate reduction under different COD/sulfate ratio, with K1app between 2.94x10-5 s-1 and 1.17x10-5 s-1 with correlation coefficients for data over 91%. The maximum rate to sulfate reduction was 18.0 mg SO42-/L.h-1 and small variation in COD/sulfate ratio promotes a significant change both in sulfate and sulfide concentrations.

  8. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  9. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  10. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  11. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  12. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  13. Setting constraints on the nature and origin of the two major hydrous sulfates on Mars: Monohydrated and polyhydrated sulfates

    Science.gov (United States)

    Wang, Alian; Jolliff, Bradley L.; Liu, Yang; Connor, Kathryn

    2016-04-01

    Monohydrated Mg sulfate (MgSO4·H2O) and polyhydrated sulfate are the most common and abundant hydrous sulfates observed thus far on Mars. They are widely distributed and coexist in many locations. On the basis of results from two new sets of experiments, in combination with past experimental studies and the subsurface salt mineralogy observed at a saline playa (Dalangtan, DLT) in a terrestrial analogue hyperarid region on the Tibet Plateau, we can now set new constraints on the nature and origin of these two major Martian sulfates. Starkeyite (MgSO4·4H2O) is the best candidate for polyhydrated sulfate. MgSO4·H2O in the form of "LH-1w," generated from dehydration of Mg sulfates with high degrees of hydration, is the most likely mineral form for the majority of Martian monohydrated Mg sulfate. Two critical properties of Mg sulfates are responsible for the coexistence of these two phases that have very different degrees of hydration: (1) the metastability of a substructural unit in starkeyite at relatively low temperatures, and (2) catalytic effects attributed to coprecipitated species (sulfates, chlorides, oxides, and hydroxides) from chemically complex brines that help overcome the metastability of starkeyite. The combination of these two properties controls the coexistence of the LH-1w layer and starkeyite layers at many locations on Mars, which sometimes occur in an interbedded stratigraphy. The structural H2O held by these two broadly distributed sulfates represents a large H2O reservoir at the surface and in the shallow subsurface on current Mars.

  14. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  15. Thermophilic Sulfate-Reducing Bacteria in Cold Marine Sediment

    DEFF Research Database (Denmark)

    ISAKSEN, MF; BAK, F.; JØRGENSEN, BB

    1994-01-01

    sulfate-reducing bacteria was detected. Time course experiments showed constant sulfate reduction rates at 4 degrees C and 30 degrees C, whereas the activity at 60 degrees C increased exponentially after a lag period of one day. Thermophilic, endospore-forming sulfate-reducing bacteria, designated strain...... C to search for presence of psychrophilic, mesophilic and thermophilic sulfate-reducing bacteria. Detectable activity was initially only in the mesophilic range, but after a lag phase sulfate reduction by thermophilic sulfate-reducing bacteria were observed. No distinct activity of psychrophilic...... P60, were isolated and characterized as Desulfotomaculum kuznetsovii. The temperature response of growth and respiration of strain P60 agreed well with the measured sulfate reduction at 50 degrees-70 degrees C. Bacteria similar to strain P60 could thus be responsible for the measured thermophilic...

  16. Thermophilic Sulfate-Reducing Bacteria in Cold Marine Sediment

    DEFF Research Database (Denmark)

    ISAKSEN, MF; BAK, F.; JØRGENSEN, BB

    1994-01-01

    C to search for presence of psychrophilic, mesophilic and thermophilic sulfate-reducing bacteria. Detectable activity was initially only in the mesophilic range, but after a lag phase sulfate reduction by thermophilic sulfate-reducing bacteria were observed. No distinct activity of psychrophilic...... sulfate-reducing bacteria was detected. Time course experiments showed constant sulfate reduction rates at 4 degrees C and 30 degrees C, whereas the activity at 60 degrees C increased exponentially after a lag period of one day. Thermophilic, endospore-forming sulfate-reducing bacteria, designated strain...... P60, were isolated and characterized as Desulfotomaculum kuznetsovii. The temperature response of growth and respiration of strain P60 agreed well with the measured sulfate reduction at 50 degrees-70 degrees C. Bacteria similar to strain P60 could thus be responsible for the measured thermophilic...

  17. Sulfate reduction in freshwater peatlands

    Energy Technology Data Exchange (ETDEWEB)

    Oequist, M.

    1996-12-31

    This text consist of two parts: Part A is a literature review on microbial sulfate reduction with emphasis on freshwater peatlands, and part B presents the results from a study of the relative importance of sulfate reduction and methane formation for the anaerobic decomposition in a boreal peatland. The relative importance of sulfate reduction and methane production for the anaerobic decomposition was studied in a small raised bog situated in the boreal zone of southern Sweden. Depth distribution of sulfate reduction- and methane production rates were measured in peat sampled from three sites (A, B, and C) forming an minerotrophic-ombrotrophic gradient. SO{sub 4}{sup 2-} concentrations in the three profiles were of equal magnitude and ranged from 50 to 150 {mu}M. In contrast, rates of sulfate reduction were vastly different: Maximum rates in the three profiles were obtained at a depth of ca. 20 cm below the water table. In A it was 8 {mu}M h{sup -1} while in B and C they were 1 and 0.05 {mu}M h{sup -1}, respectively. Methane production rates, however, were more uniform across the three nutrient regimes. Maximum rates in A (ca. 1.5 {mu}g d{sup -1} g{sup -1}) were found 10 cm below the water table, in B (ca. 1.0 {mu}g d{sup -1} g{sup -1}) in the vicinity of the water table, and in C (0.75 {mu}g d{sup -1} g{sup -1}) 20 cm below the water table. In all profiles both sulfate reduction and methane production rates were negligible above the water table. The areal estimates of methane production for the profiles were 22.4, 9.0 and 6.4 mmol m{sup -2} d{sup -1}, while the estimates for sulfate reduction were 26.4, 2.5, and 0.1 mmol m{sup -2} d{sup -1}, respectively. The calculated turnover times at the sites were 1.2, 14.2, and 198.7 days, respectively. The study shows that sulfate reducing bacteria are important for the anaerobic degradation in the studied peatland, especially in the minerotrophic sites, while methanogenic bacteria dominate in ombrotrophic sites Examination

  18. Sulfate reduction in freshwater peatlands

    International Nuclear Information System (INIS)

    Oequist, M.

    1996-01-01

    This text consist of two parts: Part A is a literature review on microbial sulfate reduction with emphasis on freshwater peatlands, and part B presents the results from a study of the relative importance of sulfate reduction and methane formation for the anaerobic decomposition in a boreal peatland. The relative importance of sulfate reduction and methane production for the anaerobic decomposition was studied in a small raised bog situated in the boreal zone of southern Sweden. Depth distribution of sulfate reduction- and methane production rates were measured in peat sampled from three sites (A, B, and C) forming an minerotrophic-ombrotrophic gradient. SO 4 2- concentrations in the three profiles were of equal magnitude and ranged from 50 to 150 μM. In contrast, rates of sulfate reduction were vastly different: Maximum rates in the three profiles were obtained at a depth of ca. 20 cm below the water table. In A it was 8 μM h -1 while in B and C they were 1 and 0.05 μM h -1 , respectively. Methane production rates, however, were more uniform across the three nutrient regimes. Maximum rates in A (ca. 1.5 μg d -1 g -1 ) were found 10 cm below the water table, in B (ca. 1.0 μg d -1 g -1 ) in the vicinity of the water table, and in C (0.75 μg d -1 g -1 ) 20 cm below the water table. In all profiles both sulfate reduction and methane production rates were negligible above the water table. The areal estimates of methane production for the profiles were 22.4, 9.0 and 6.4 mmol m -2 d -1 , while the estimates for sulfate reduction were 26.4, 2.5, and 0.1 mmol m -2 d -1 , respectively. The calculated turnover times at the sites were 1.2, 14.2, and 198.7 days, respectively. The study shows that sulfate reducing bacteria are important for the anaerobic degradation in the studied peatland, especially in the minerotrophic sites, while methanogenic bacteria dominate in ombrotrophic sites Examination paper. 67 refs, 6 figs, 3 tabs

  19. Sulfation and cation effects on the conformational properties of the glycan backbone of chondroitin sulfate disaccharides.

    Science.gov (United States)

    Faller, Christina E; Guvench, Olgun

    2015-05-21

    Chondroitin sulfate (CS) is one of several glycosaminoglycans that are major components of proteoglycans. A linear polymer consisting of repeats of the disaccharide -4GlcAβ1-3GalNAcβ1-, CS undergoes differential sulfation resulting in five unique sulfation patterns. Because of the dimer repeat, the CS glycosidic "backbone" has two distinct sets of conformational degrees of freedom defined by pairs of dihedral angles: (ϕ1, ψ1) about the β1-3 glycosidic linkage and (ϕ2, ψ2) about the β1-4 glycosidic linkage. Differential sulfation and the possibility of cation binding, combined with the conformational flexibility and biological diversity of CS, complicate experimental efforts to understand CS three-dimensional structures at atomic resolution. Therefore, all-atom explicit-solvent molecular dynamics simulations with Adaptive Biasing Force sampling of the CS backbone were applied to obtain high-resolution, high-precision free energies of CS disaccharides as a function of all possible backbone geometries. All 10 disaccharides (β1-3 vs β1-4 linkage × five different sulfation patterns) were studied; additionally, ion effects were investigated by considering each disaccharide in the presence of either neutralizing sodium or calcium cations. GlcAβ1-3GalNAc disaccharides have a single, broad, thermodynamically important free-energy minimum, whereas GalNAcβ1-4GlcA disaccharides have two such minima. Calcium cations but not sodium cations bind to the disaccharides, and binding is primarily to the GlcA -COO(-) moiety as opposed to sulfate groups. This binding alters the glycan backbone thermodynamics in instances where a calcium cation bound to -COO(-) can act to bridge and stabilize an interaction with an adjacent sulfate group, whereas, in the absence of this cation, the proximity of a sulfate group to -COO(-) results in two like charges being both desolvated and placed adjacent to each other and is found to be destabilizing. In addition to providing information

  20. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  1. Development and validation of an alternative titration method for the determination of sulfate ion in indinavir sulfate

    Directory of Open Access Journals (Sweden)

    Breno de Carvalho e Silva

    2005-02-01

    Full Text Available A simple and rapid precipitation titration method was developed and validated to determine sulfate ion content in indinavir sulfate raw material. 0.1 mol L-1 lead nitrate volumetric solution was used as titrant employing potentiometric endpoint determination using a lead-specific electrode. The United States Pharmacopoeia Forum indicates a potentiometric method for sulfate ion quantitation using 0.1 mol L-1 lead perchlorate as titrant. Both methods were validated concerning linearity, precision and accuracy, yielding good results. The sulfate ion content found by the two validated methods was compared by the statistical t-student test, indicating that there was no statistically significant difference between the methods.

  2. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  4. The Role of Parents' Attachment Orientations, Depressive Symptoms, and Conflict Behaviors in Children's Externalizing and Internalizing Behavior Problems

    Science.gov (United States)

    Marchand, Jennifer F.; Schedler, Steven; Wagstaff, David A.

    2004-01-01

    The present study examined links among parents' attachment orientations, depressive symptoms, and conflict behaviors (attacking and compromising) and children's externalizing and internalizing behavior problems in a sample of 64 nonclinical, Caucasian families. Correlational analyses showed that all three parent attributes were significantly…

  5. The combined therapy with chondroitin sulfate plus glucosamine sulfate or chondroitin sulfate plus glucosamine hydrochloride does not improve joint damage in an experimental model of knee osteoarthritis in rabbits.

    Science.gov (United States)

    Roman-Blas, Jorge A; Mediero, Aránzazu; Tardío, Lidia; Portal-Nuñez, Sergio; Gratal, Paula; Herrero-Beaumont, Gabriel; Largo, Raquel

    2017-01-05

    Osteoarthritis is the most common chronic joint disorder especially during aging. Although with controversies, glucosamine, both in its forms of sulfate and hydrochloride, and chondroitin sulfate are commonly employed to treat osteoarthritis. Due to the modest improve in the symptoms observed in patients treated with these drugs alone, a formulation combining both agents has been considered. The discrepant results achieved for pain control or structural improvement in osteoarthritis patients has been attributed to the quality of chemical formulations or different bias in clinical studies. The current study has been designed to test the effects of two different combined formulations with adequate pharmaceutical grade of these drugs in osteoarthritic joints, and to explore the underlying mechanisms modulated by both formulations in different osteoarthritis target tissues. Knee osteoarthritis was surgically induced in experimental rabbits. Some animals received the combined therapy (CT)1, (chondroitin sulfate 1200mg/day + glucosamine sulfate 1500mg/day), or the CT2 ((chondroitin sulfate 1200mg/day + glucosamine hydrochloride 1500mg/day). Neither CT1 nor CT2 significantly modified the cartilage damage or the synovial inflammation observed in osteoarthritic animals. Treatments were also unable to modify the presence of pro-inflammatory mediators, and the synthesis of metalloproteinases in the cartilage or in the synovium of osteoarthritic animals. Combined therapies did not modify the decrease in the subchondral bone mineral density observed in osteoarthritic rabbits. Therapies of chondroitin sulfate plus glucosamine sulfate or chondroitin sulfate plus glucosamine hydrochloride failed to improve structural damage or to ameliorate the inflammatory profile of joint tissues during experimental osteoarthritis. Published by Elsevier B.V.

  6. Highly sulfated hexasaccharide sequences isolated from chondroitin sulfate of shark fin cartilage: insights into the sugar sequences with bioactivities.

    Science.gov (United States)

    Mizumoto, Shuji; Murakoshi, Saori; Kalayanamitra, Kittiwan; Deepa, Sarama Sathyaseelan; Fukui, Shigeyuki; Kongtawelert, Prachya; Yamada, Shuhei; Sugahara, Kazuyuki

    2013-02-01

    Chondroitin sulfate (CS) chains regulate the development of the central nervous system in vertebrates and are linear polysaccharides consisting of variously sulfated repeating disaccharides, [-4GlcUAβ1-3GalNAcβ1-](n), where GlcUA and GalNAc represent D-glucuronic acid and N-acetyl-D-galactosamine, respectively. CS chains containing D-disaccharide units [GlcUA(2-O-sulfate)-GalNAc(6-O-sulfate)] are involved in the development of cerebellar Purkinje cells and neurite outgrowth-promoting activity through interaction with a neurotrophic factor, pleiotrophin, resulting in the regulation of signaling. In this study, to obtain further structural information on the CS chains containing d-disaccharide units involved in brain development, oligosaccharides containing D-units were isolated from a shark fin cartilage. Seven novel hexasaccharide sequences, ΔO-D-D, ΔA-D-D, ΔC-D-D, ΔE-A-D, ΔD-D-C, ΔE-D-D and ΔA-B-D, in addition to three previously reported sequences, ΔC-A-D, ΔC-D-C and ΔA-D-A, were isolated from a CS preparation of shark fin cartilage after exhaustive digestion with chondroitinase AC-I, which cannot act on the galactosaminidic linkages bound to D-units. The symbol Δ stands for a 4,5-unsaturated bond of uronic acids, whereas A, B, C, D, E and O represent [GlcUA-GalNAc(4-O-sulfate)], [GlcUA(2-O-sulfate)-GalNAc(4-O-sulfate)], [GlcUA-GalNAc(6-O-sulfate)], [GlcUA(2-O-sulfate)-GalNAc(6-O-sulfate)], [GlcUA-GalNAc(4-O-, 6-O-sulfate)] and [GlcUA-GalNAc], respectively. In binding studies using an anti-CS monoclonal antibody, MO-225, the epitopes of which are involved in cerebellar development in mammals, novel epitope structures, ΔA-D-A, ΔA-D-D and ΔA-B-D, were revealed. Hexasaccharides containing two consecutive D-units or a B-unit will be useful for the structural and functional analyses of CS chains particularly in the neuroglycobiological fields.

  7. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  8. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  9. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  10. Process for removing sulfate anions from waste water

    Science.gov (United States)

    Nilsen, David N.; Galvan, Gloria J.; Hundley, Gary L.; Wright, John B.

    1997-01-01

    A liquid emulsion membrane process for removing sulfate anions from waste water is disclosed. The liquid emulsion membrane process includes the steps of: (a) providing a liquid emulsion formed from an aqueous strip solution and an organic phase that contains an extractant capable of removing sulfate anions from waste water; (b) dispersing the liquid emulsion in globule form into a quantity of waste water containing sulfate anions to allow the organic phase in each globule of the emulsion to extract and absorb sulfate anions from the waste water and (c) separating the emulsion including its organic phase and absorbed sulfate anions from the waste water to provide waste water containing substantially no sulfate anions.

  11. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  12. A concept of external aerodynamic elements in improving the performance of natural smoke ventilation in wind conditions

    Science.gov (United States)

    Wegrzyński, Wojciech; Krajewski, Grzegorz; Kimbar, Grzegorz

    2018-01-01

    This paper is a proposal of a new device that may be used as a component of natural smoke ventilation systems - an external aerodynamic baffle used to limit the wind effect at the most adverse angle. Natural ventilation is not only affected by the external wind, but also dependent on the angle of wind attack. It has been proven, that at angles between 45° to 60° the performance of such device is the lowest. This is the reason why additional device is proposed - external baffle that could hypothetically increase the performance at chosen angles. The purpose of this paper is to explore this idea by numerical modelling of such external elements on a validated natural ventilator model, with use of ANSYS® Fluent® CFD model.

  13. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  14. A potential role for chondroitin sulfate/dermatan sulfate in arm regeneration in Amphiura filiformis.

    Science.gov (United States)

    Ramachandra, Rashmi; Namburi, Ramesh B; Dupont, Sam T; Ortega-Martinez, Olga; van Kuppevelt, Toin H; Lindahl, Ulf; Spillmann, Dorothe

    2017-05-01

    Glycosaminoglycans (GAGs), such as chondroitin sulfate (CS) and dermatan sulfate (DS) from various vertebrate and invertebrate sources are known to be involved in diverse cellular mechanisms during repair and regenerative processes. Recently, we have identified CS/DS as the major GAG in the brittlestar Amphiura filiformis, with high proportions of di- and tri-O-sulfated disaccharide units. As this echinoderm is known for its exceptional regeneration capacity, we aimed to explore the role of these GAG chains during A. filiformis arm regeneration. Analysis of CS/DS chains during the regeneration process revealed an increase in the proportion of the tri-O-sulfated disaccharides. Conversely, treatment of A. filiformis with sodium chlorate, a potent inhibitor of sulfation reactions in GAG biosynthesis, resulted in a significant reduction in arm growth rates with total inhibition at concentrations higher than 5 mM. Differentiation was less impacted by sodium chlorate exposure or even slightly increased at 1-2 mM. Based on the structural changes observed during arm regeneration we identified chondroitin synthase, chondroitin-4-O-sulfotransferase 2 and dermatan-4-O-sulfotransferase as candidate genes and sought to correlate their expression with the expression of the A. filiformis orthologue of bone morphogenetic factors, AfBMP2/4. Quantitative amplification by real-time PCR indicated increased expression of chondroitin synthase and chondroitin-4-O-sulfotransferase 2, with a corresponding increase in AfBMP2/4 during regeneration relative to nonregenerating controls. Our findings suggest that proper sulfation of GAGs is important for A. filiformis arm regeneration and that these molecules may participate in mechanisms controlling cell proliferation. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Sulfate transport in toad skin

    DEFF Research Database (Denmark)

    Larsen, Erik Hviid; Simonsen, K

    1988-01-01

    1. In short-circuited toad skin preparations exposed bilaterally to NaCl-Ringer's containing 1 mM SO2(-4), influx of sulfate was larger than efflux showing that the skin is capable of transporting sulfate actively in an inward direction. 2. This active transport was not abolished by substituting...... apical Na+ for K+. 3. Following voltage activation of the passive Cl- permeability of the mitochondria-rich (m.r.) cells sulfate flux-ratio increased to a value predicted from the Ussing flux-ratio equation for a monovalent anion. 4. In such skins, which were shown to exhibit vanishingly small leakage...... conductances, the variation of the rate coefficient for sulfate influx (y) was positively correlated with the rate coefficient for Cl- influx (x), y = 0.035 x - 0.0077 cm/sec (r = 0.9935, n = 15). 5. Addition of the phosphodiesterase inhibitor, 3-isobutyl-1-methyl-xanthine to the serosal bath of short...

  16. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  17. N-sulfation of heparan sulfate is critical for syndecan-4-mediated podocyte cell-matrix interactions

    NARCIS (Netherlands)

    Sugar, T.; Wassenhove-McCarthy, D.J.; Orr, A.W.; Green, J.; Kuppevelt, T.H. van; McCarthy, K.J.

    2016-01-01

    Previous research has shown that podocytes unable to assemble heparan sulfate on cell surface proteoglycan core proteins have compromised cell-matrix interactions. This report further explores the role of N-sulfation of intact heparan chains in podocyte-matrix interactions. For the purposes of this

  18. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  19. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  20. Immobilization of calcium sulfate contained in demolition waste

    International Nuclear Information System (INIS)

    Ambroise, J.; Pera, J.

    2008-01-01

    This paper presents the results of a laboratory study undertaken to examine the treatment of demolition waste containing calcium sulfate by means of calcium sulfoaluminate clinker (CSA). The quantity of CSA necessary to entirely consume calcium sulfate was determined. Using infrared spectrometry analysis and X-ray diffraction, it was shown that calcium sulfate was entirely consumed when the ratio between CSA and calcium sulfate was 4. Standard sand was polluted by 4% calcium sulfate. Two solutions were investigated: ·either global treatment of sand by CSA, ·or immobilization of calcium sulfate by CSA, followed by the introduction of this milled mixture in standard sand. Regardless of the type of treatment, swelling was almost stabilized after 28 days of immersion in water

  1. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  2. Acid Sulfate Alteration on Mars

    Science.gov (United States)

    Ming, D. W.; Morris, R. V.

    2016-01-01

    A variety of mineralogical and geochemical indicators for aqueous alteration on Mars have been identified by a combination of surface and orbital robotic missions, telescopic observations, characterization of Martian meteorites, and laboratory and terrestrial analog studies. Acid sulfate alteration has been identified at all three landing sites visited by NASA rover missions (Spirit, Opportunity, and Curiosity). Spirit landed in Gusev crater in 2004 and discovered Fe-sulfates and materials that have been extensively leached by acid sulfate solutions. Opportunity landing on the plains of Meridiani Planum also in 2004 where the rover encountered large abundances of jarosite and hematite in sedimentary rocks. Curiosity landed in Gale crater in 2012 and has characterized fluvial, deltaic, and lacustrine sediments. Jarosite and hematite were discovered in some of the lacustrine sediments. The high elemental abundance of sulfur in surface materials is obvious evidence that sulfate has played a major role in aqueous processes at all landing sites on Mars. The sulfate-rich outcrop at Meridiani Planum has an SO3 content of up to 25 wt.%. The interiors of rocks and outcrops on the Columbia Hills within Gusev crater have up to 8 wt.% SO3. Soils at both sites generally have between 5 to 14 wt.% SO3, and several soils in Gusev crater contain around 30 wt.% SO3. After normalization of major element compositions to a SO3-free basis, the bulk compositions of these materials are basaltic, with a few exceptions in Gusev crater and in lacustrine mudstones in Gale crater. These observations suggest that materials encountered by the rovers were derived from basaltic precursors by acid sulfate alteration under nearly isochemical conditions (i.e., minimal leaching). There are several cases, however, where acid sulfate alteration minerals (jarosite and hematite) formed in open hydrologic systems, e.g., in Gale crater lacustrine mudstones. Several hypotheses have been suggested for the

  3. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  4. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  7. Mencegah Pembentukan Kalsium Sulfat pada Desalinasi Air Laut

    Directory of Open Access Journals (Sweden)

    Mirna Rahmah Lubis

    2007-06-01

    Full Text Available Resin penukar-anion, Relite MG 1/P, dapat digunakan untuk memisahkan sulfat dalam air laut guna mencegah pembentukan kerak kalsium sulfat pada heat exchanger. Resin tersebut menunjukkan selektivitas sulfat yang tinggi dalam air laut sintetis. Resin yang telah dipakai dapat diregenerasi menggunakan air asin yang dipekatkan dengan asam hingga mencapai pH 4. Untuk waktu pemakaian dan regenerasi yang sama, faktor konsentrasi desalinasi (misalnya 2 hingga 4 menaikkan konsentrasi klorida dalam air asin yang diblowdown. Dengan faktor konsentrasi yang tetap, kenaikan laju alir (pengurangan waktu pemakaian dan regenerasi memperendah efisiensi regenerasi dan menaikkan pemisahan sulfat. Akibat kelarutan kalsium sulfat yang bersifat terbalik tersebut, temperatur air asin yang tinggi memerlukan pemisahan sulfat yang lebih banyak, yang dapat dicapai dengan mengurangi laju alir air laut. Pengurangan laju alir tersebut membutuhkan peralatan yang lebih besar dan resin yang lebih banyak, sehingga biaya modal bertambah. Untuk pabrik desalinasi dengan kapasitas produksi 1 juta gallon per hari dan faktor konsentrasi sebesar 2, biaya pemisahan sulfat meliputi biaya resin dan biaya peralatan. Biaya tersebut bervariasi dari $0.246 hingga $0.356/kgalon (per ribu galon air yang diproduksi karena temperatur maksimum air asin berubah dari 140°C menjadi 180°C. Keywords: desalinasi air laut, ion exchange, kalsium sulfat, kerak; mechanical vapor compression (MVC, pemisahan sulfat, resin penukar-anion basa lemah

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  9. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  10. EFFECT OF MAGNESIUM SULFATE (A LAXATIVE) ON ...

    African Journals Online (AJOL)

    use with little success . Magnesium sulfate also known as Epsom salt or bitter salt is a hydrate salt with a chemical name of magnesium sulfate heptahydrate . Chemical formula is MgSO. 7HO and trade name is. Andrews liver salt. Dried magnesium sulfate is an osmotic laxative or a saline laxative that acts by increasing the.

  11. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  13. Extraction of beryllium sulfate by a long chain amine; Extraction du sulfate de beryllium par une amine a longue chaine

    Energy Technology Data Exchange (ETDEWEB)

    Etaix, E.S. [Commissariat a l' Energie Atomique, Fontenay-Aux-Roses (France). Centre d' Etudes Nucleaires

    1968-06-01

    The extraction of sulfuric acid in aqueous solution by a primary amine in benzene solution, 3-9 (diethyl) - 6-amino tri-decane (D.E.T. ) - i.e., with American nomenclature 1-3 (ethyl-pentyl) - 4-ethyl-octyl amine (E.P.O.) - has made it possible to calculate the formation constants of alkyl-ammonium sulfate and acid sulfate. The formula of the beryllium and alkyl-ammonium sulfate complex formed in benzene has next been determined, for various initial acidity of the aqueous solution. Lastly, evidence has been given of negatively charged complexes of beryllium and sulfate in aqueous solution, through the dependence of the aqueous sulfate ions concentration upon beryllium extraction. The formation constant of these anionic complexes has been evaluated. (author) [French] L'etude de l'extraction de l'acide sulfurique en solution aqueuse par une amine primaire en solution dans le benzene, le diethyl-3,9 amino-6 tridecane (D.E.T.) - autre nom americain 1-3 (ethylpentyl) - 4-ethyloctylamine (E.P.O.) a permis de calculer les constantes de formation du sulfate et de l'hydrogenosulfate d'alkyl-ammonium. La formule du complexe de sulfate de beryllium et d'alkyl-ammonium forme en solution benzenique a ete ensuite determinee pour diverses acidites initiales de la solution aqueuse. Enfin, l'influence de la concentration des ions sulfate de la phase aqueuse sur l'extraction du beryllium a mis en evidence la formation en solution aqueuse de complexes anioniques de sulfate et de beryllium dont la constante de formation a ete evaluee. (auteur)

  14. Extraction of beryllium sulfate by a long chain amine; Extraction du sulfate de beryllium par une amine a longue chaine

    Energy Technology Data Exchange (ETDEWEB)

    Etaix, E S [Commissariat a l' Energie Atomique, Fontenay-Aux-Roses (France). Centre d' Etudes Nucleaires

    1968-06-01

    The extraction of sulfuric acid in aqueous solution by a primary amine in benzene solution, 3-9 (diethyl) - 6-amino tri-decane (D.E.T. ) - i.e., with American nomenclature 1-3 (ethyl-pentyl) - 4-ethyl-octyl amine (E.P.O.) - has made it possible to calculate the formation constants of alkyl-ammonium sulfate and acid sulfate. The formula of the beryllium and alkyl-ammonium sulfate complex formed in benzene has next been determined, for various initial acidity of the aqueous solution. Lastly, evidence has been given of negatively charged complexes of beryllium and sulfate in aqueous solution, through the dependence of the aqueous sulfate ions concentration upon beryllium extraction. The formation constant of these anionic complexes has been evaluated. (author) [French] L'etude de l'extraction de l'acide sulfurique en solution aqueuse par une amine primaire en solution dans le benzene, le diethyl-3,9 amino-6 tridecane (D.E.T.) - autre nom americain 1-3 (ethylpentyl) - 4-ethyloctylamine (E.P.O.) a permis de calculer les constantes de formation du sulfate et de l'hydrogenosulfate d'alkyl-ammonium. La formule du complexe de sulfate de beryllium et d'alkyl-ammonium forme en solution benzenique a ete ensuite determinee pour diverses acidites initiales de la solution aqueuse. Enfin, l'influence de la concentration des ions sulfate de la phase aqueuse sur l'extraction du beryllium a mis en evidence la formation en solution aqueuse de complexes anioniques de sulfate et de beryllium dont la constante de formation a ete evaluee. (auteur)

  15. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  16. Expression and activity of sulfate transporters and APS reductase in curly kale in response to sulfate deprivation and re-supply

    NARCIS (Netherlands)

    Koralewska, Aleksandra; Buchner, Peter; Stuiver, C. Elisabeth E.; Posthumus, Freek S.; Kopriva, Stanislav; Hawkesford, Malcolm J.; De Kok, Luit J.

    2009-01-01

    Both activity and expression of sulfate transporters and APS reductase in plants are modulated by the sulfur status of the plant. To examine the regulatory mechanisms in curly kale (Brossica olerracea L.), the sulfate supply was manipulated by the transfer of seedlings to sulfate-deprived

  17. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  18. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  19. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  20. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  2. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. Modeling and minimization of barium sulfate scale

    Science.gov (United States)

    Alan W. Rudie; Peter W. Hart

    2006-01-01

    The majority of the barium present in the pulping process exits the digester as barium carbonate. Barium carbonate dissolves in the bleach plant when the pH drops below 7 and, if barium and sulfate concentrations are too high, begins to precipitate as barium sulfate. Barium is difficult to control because a mill cannot avoid this carbonate-to-sulfate transition using...

  4. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  5. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  6. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  7. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  8. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  9. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  12. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  13. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  14. Chondroitin / dermatan sulfate modification enzymes in zebrafish development.

    Directory of Open Access Journals (Sweden)

    Judith Habicher

    Full Text Available Chondroitin/dermatan sulfate (CS/DS proteoglycans consist of unbranched sulfated polysaccharide chains of repeating GalNAc-GlcA/IdoA disaccharide units, attached to serine residues on specific proteins. The CS/DS proteoglycans are abundant in the extracellular matrix where they have essential functions in tissue development and homeostasis. In this report a phylogenetic analysis of vertebrate genes coding for the enzymes that modify CS/DS is presented. We identify single orthologous genes in the zebrafish genome for the sulfotransferases chst7, chst11, chst13, chst14, chst15 and ust and the epimerase dse. In contrast, two copies were found for mammalian sulfotransferases CHST3 and CHST12 and the epimerase DSEL, named chst3a and chst3b, chst12a and chst12b, dsela and dselb, respectively. Expression of CS/DS modification enzymes is spatially and temporally regulated with a large variation between different genes. We found that CS/DS 4-O-sulfotransferases and 6-O-sulfotransferases as well as CS/DS epimerases show a strong and partly overlapping expression, whereas the expression is restricted for enzymes with ability to synthesize di-sulfated disaccharides. A structural analysis further showed that CS/DS sulfation increases during embryonic development mainly due to synthesis of 4-O-sulfated GalNAc while the proportion of 6-O-sulfated GalNAc increases in later developmental stages. Di-sulfated GalNAc synthesized by Chst15 and 2-O-sulfated GlcA/IdoA synthesized by Ust are rare, in accordance with the restricted expression of these enzymes. We also compared CS/DS composition with that of heparan sulfate (HS. Notably, CS/DS biosynthesis in early zebrafish development is more dynamic than HS biosynthesis. Furthermore, HS contains disaccharides with more than one sulfate group, which are virtually absent in CS/DS.

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  16. Effects of sulfate chitosan derivatives on nonalcoholic fatty liver disease

    Science.gov (United States)

    Yu, Mingming; Wang, Yuanhong; Jiang, Tingfu; Lv, Zhihua

    2014-06-01

    Sulfate chitosan derivatives have good solubility and therapeutic effect on the cell model of NAFLD. The aim of this study was to examine the therapeutic effect of sulfate chitosan derivatives on NAFLD. The male Wistar rats were orally fed high fat emulsion and received sulfate chitosan derivatives for 5 weeks to determine the pre-treatment effect of sulfate chitosan derivatives on NAFLD. To evaluate the therapeutic effect of sulfate chitosan derivatives on NAFLD, the rats were orally fed with high concentration emulsion for 5 weeks, followed by sulfate chitosan derivatives for 3 weeks. Histological analysis and biomedical assays showed that sulfate chitosan derivatives can dramatically prevent the development of hepatic steatosis in hepatocyte cells. In animal studies, pre-treatment and treatment with sulfate chitosan derivatives significantly protected against hepatic steatohepatitis induced by high fat diet according to histological analysis. Furthermore, increased TC, ALT, MDA, and LEP in NAFLD were significantly ameliorated by pre-treatment and treatment with sulfate chitosan derivatives. Furthermore, increased TG, AST, and TNF-α in NAFLD were significantly ameliorated by treatment with sulfate chitosan derivatives. Sulfate chitosan derivatives have good pre-treatment and therapeutic effect on NAFLD.

  17. Importance of sulfate radical anion formation and chemistry in heterogeneous OH oxidation of sodium methyl sulfate, the smallest organosulfate

    Science.gov (United States)

    Chung Kwong, Kai; Chim, Man Mei; Davies, James F.; Wilson, Kevin R.; Nin Chan, Man

    2018-02-01

    Organosulfates are important organosulfur compounds present in atmospheric particles. While the abundance, composition, and formation mechanisms of organosulfates have been extensively investigated, it remains unclear how they transform and evolve throughout their atmospheric lifetime. To acquire a fundamental understanding of how organosulfates chemically transform in the atmosphere, this work investigates the heterogeneous OH radical-initiated oxidation of sodium methyl sulfate (CH3SO4Na) droplets, the smallest organosulfate detected in atmospheric particles, using an aerosol flow tube reactor at a high relative humidity (RH) of 85 %. Aerosol mass spectra measured by a soft atmospheric pressure ionization source (direct analysis in real time, DART) coupled with a high-resolution mass spectrometer showed that neither functionalization nor fragmentation products are detected. Instead, the ion signal intensity of the bisulfate ion (HSO4-) has been found to increase significantly after OH oxidation. We postulate that sodium methyl sulfate tends to fragment into a formaldehyde (CH2O) and a sulfate radical anion (SO4 ṡ -) upon OH oxidation. The formaldehyde is likely partitioned back to the gas phase due to its high volatility. The sulfate radical anion, similar to OH radical, can abstract a hydrogen atom from neighboring sodium methyl sulfate to form the bisulfate ion, contributing to the secondary chemistry. Kinetic measurements show that the heterogeneous OH reaction rate constant, k, is (3.79 ± 0.19) × 10-13 cm3 molecule-1 s-1 with an effective OH uptake coefficient, γeff, of 0.17 ± 0.03. While about 40 % of sodium methyl sulfate is being oxidized at the maximum OH exposure (1.27 × 1012 molecule cm-3 s), only a 3 % decrease in particle diameter is observed. This can be attributed to a small fraction of particle mass lost via the formation and volatilization of formaldehyde. Overall, we firstly demonstrate that the heterogeneous OH oxidation of an

  18. Chondroitin-4-sulfation negatively regulates axonal guidance and growth

    Science.gov (United States)

    Wang, Hang; Katagiri, Yasuhiro; McCann, Thomas E.; Unsworth, Edward; Goldsmith, Paul; Yu, Zu-Xi; Tan, Fei; Santiago, Lizzie; Mills, Edward M.; Wang, Yu; Symes, Aviva J.; Geller, Herbert M.

    2008-01-01

    Summary Glycosaminoglycan (GAG) side chains endow extracellular matrix proteoglycans with diversity and complexity based upon the length, composition, and charge distribution of the polysaccharide chain. Using cultured primary neurons, we show that specific sulfation in the GAG chains of chondroitin sulfate (CS) mediates neuronal guidance cues and axonal growth inhibition. Chondroitin-4-sulfate (CS-A), but not chondroitin-6-sulfate (CS-C), exhibits a strong negative guidance cue to mouse cerebellar granule neurons. Enzymatic and gene-based manipulations of 4-sulfation in the GAG side chains alter their ability to direct growing axons. Furthermore, 4-sulfated CS GAG chains are rapidly and significantly increased in regions that do not support axonal regeneration proximal to spinal cord lesions in mice. Thus, our findings provide the evidence showing that specific sulfation along the carbohydrate backbone carries instructions to regulate neuronal function. PMID:18768934

  19. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  20. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  1. Acidity-Reactivity Relationships in Catalytic Esterification over Ammonium Sulfate-Derived Sulfated Zirconia

    Directory of Open Access Journals (Sweden)

    Abdallah I. M. Rabee

    2017-07-01

    Full Text Available New insight was gained into the acidity-reactivity relationships of sulfated zirconia (SZ catalysts prepared via (NH42SO4 impregnation of Zr(OH4 for propanoic acid esterification with methanol. A family of systematically related SZs was characterized by bulk and surface analyses including XRD, XPS, TGA-MS, N2 porosimetry, temperature-programmed propylamine decomposition, and FTIR of adsorbed pyridine, as well as methylbutynol (MBOH as a reactive probe molecule. Increasing surface sulfation induces a transition from amphoteric character for the parent zirconia and low S loadings <1.7 wt %, evidenced by MBOH conversion to 3-hydroxy-3-methyl-2-butanone, methylbutyne and acetone, with higher S loadings resulting in strong Brønsted-Lewis acid pairs upon completion of the sulfate monolayer, which favored MBOH conversion to prenal. Catalytic activity for propanoic acid esterification directly correlated with acid strength determined from propylamine decomposition, coincident with the formation of Brønsted-Lewis acid pairs identified by MBOH reactive titration. Monodispersed bisulfate species are likely responsible for superacidity at intermediate sulfur loadings.

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  3. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. Barium Sulfate

    Science.gov (United States)

    ... uses a computer to put together x-ray images to create cross-sectional or three dimensional pictures of the inside of the body). Barium sulfate is in a class of medications called radiopaque contrast media. It works by coating the esophagus, stomach, or ...

  5. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  6. Metabolic interactions in methanogenic and sulfate-reducing bioreactors.

    Science.gov (United States)

    Stams, A J M; Plugge, C M; de Bok, F A M; van Houten, B H G W; Lens, P; Dijkman, H; Weijma, J

    2005-01-01

    In environments where the amount of electron acceptors is insufficient for complete breakdown of organic matter, methane is formed as the major reduced end product. In such methanogenic environments organic acids are degraded by syntrophic consortia of acetogenic bacteria and methanogenic archaea. Hydrogen consumption by methanogens is essential for acetogenic bacteria to convert organic acids to acetate and hydrogen. Several syntrophic cocultures growing on propionate and butyrate have been described. These syntrophic fatty acid-degrading consortia are affected by the presence of sulfate. When sulfate is present sulfate-reducing bacteria compete with methanogenic archaea for hydrogen and acetate, and with acetogenic bacteria for propionate and butyrate. Sulfate-reducing bacteria easily outcompete methanogens for hydrogen, but the presence of acetate as carbon source may influence the outcome of the competition. By contrast, acetoclastic methanogens can compete reasonably well with acetate-degrading sulfate reducers. Sulfate-reducing bacteria grow much faster on propionate and butyrate than syntrophic consortia.

  7. Assessing the external validity of model-based estimates of the incidence of heart attack in England: a modelling study

    Directory of Open Access Journals (Sweden)

    Peter Scarborough

    2016-11-01

    Full Text Available Abstract Background The DisMod II model is designed to estimate epidemiological parameters on diseases where measured data are incomplete and has been used to provide estimates of disease incidence for the Global Burden of Disease study. We assessed the external validity of the DisMod II model by comparing modelled estimates of the incidence of first acute myocardial infarction (AMI in England in 2010 with estimates derived from a linked dataset of hospital records and death certificates. Methods Inputs for DisMod II were prevalence rates of ever having had an AMI taken from a population health survey, total mortality rates and AMI mortality rates taken from death certificates. By definition, remission rates were zero. We estimated first AMI incidence in an external dataset from England in 2010 using a linked dataset including all hospital admissions and death certificates since 1998. 95 % confidence intervals were derived around estimates from the external dataset and DisMod II estimates based on sampling variance and reported uncertainty in prevalence estimates respectively. Results Estimates of the incidence rate for the whole population were higher in the DisMod II results than the external dataset (+54 % for men and +26 % for women. Age-specific results showed that the DisMod II results over-estimated incidence for all but the oldest age groups. Confidence intervals for the DisMod II and external dataset estimates did not overlap for most age groups. Conclusion By comparison with AMI incidence rates in England, DisMod II did not achieve external validity for age-specific incidence rates, but did provide global estimates of incidence that are of similar magnitude to measured estimates. The model should be used with caution when estimating age-specific incidence rates.

  8. Investigating the effect of externalizing perspectives on cognitives biases

    DEFF Research Database (Denmark)

    Madsen, Fredrik Huitfeldt; Hicks, David L., David

    2007-01-01

    of intelligence analysis. We propose that complexity of maintaining multiple different perspectives the same data is one of the reasons for this. We further propose that a tool that facillitates the externalization multiple perspectives would reduce these biases and hence increase the overall quality...... the number of attacks that “get through”. There are many subproblems of this main problem, one of which is that relative quality of the intelligence analysis is too low [39, We observe that the analysts suffer from cognitive biases, and we assume that this is one of the reasons behind “low” quality...... of intelligence analyses....

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  11. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  12. Sulfated cellulose thin films with antithrombin affinity

    Directory of Open Access Journals (Sweden)

    2009-11-01

    Full Text Available Cellulose thin films were chemically modified by in situ sulfation to produce surfaces with anticoagulant characteristics. Two celluloses differing in their degree of polymerization (DP: CEL I (DP 215–240 and CEL II (DP 1300–1400 were tethered to maleic anhydride copolymer (MA layers and subsequently exposed to SO3•NMe3 solutions at elevated temperature. The impact of the resulting sulfation on the physicochemical properties of the cellulose films was investigated with respect to film thickness, atomic composition, wettability and roughness. The sulfation was optimized to gain a maximal surface concentration of sulfate groups. The scavenging of antithrombin (AT by the surfaces was determined to conclude on their potential anticoagulant properties.

  13. Direct sulfation of limestone based on oxy-fuel combustion technology

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.M.; Zhao, C.S.; Liu, S.T.; Wang, C.B. [North China Electric Power University, Baoding (China)

    2009-10-15

    With limestone as the sorbent, the sulfation reaction can proceed via two different routes depending on whether calcination of the limestone takes place under the given reaction conditions. The direct sulfation reaction is defined as the sulfation reaction between sulfur dioxide (SO{sub 2}) and limestone in an uncalcined state. This reaction, based on oxyfuel combustion technology, was studied by thermogravimetric analysis. Surface morphologies of the limestone particles after sulfation were examined by a scanning electron microscope. Results show that there are more pores or gaps in the product layer formed by direct sulfation of limestone than by indirect sulfation, which can be attributed to the generation of carbon dioxide (CO{sub 2}) at a reaction interface. Compared with indirect sulfation, direct sulfation of limestone can yield much higher conversion and has a much higher reaction rate. For direct sulfation, the greater porosity in the product layer greatly reduces the solid-state ion diffusion distance, resulting in a higher reaction rate and higher conversion.

  14. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  15. Chinese hamster ovary cell mutants defective in heparan sulfate biosynthesis

    International Nuclear Information System (INIS)

    Bame, K.J.; Kiser, C.S.; Esko, J.D.

    1987-01-01

    The authors have isolated Chinese hamster ovary cell mutants defective in proteoglycan synthesis by radiographic screening for cells unable to incorporate 35 SO 4 into acid-precipitable material. Some mutants did not incorporate 35 SO 4 into acid-precipitable material, whereas others incorporated about 3-fold less radioactivity. HPLC anion exchange chromatographic analysis of radiolabelled glycosaminoglycans isolated from these mutants revealed many are defective in heparan sulfate biosynthesis. Mutants 803 and 677 do not synthesize heparan sulfate, although they produce chondroitin sulfate: strain 803 makes chondroitin sulfate normally, whereas 677 overaccumulates chondroitin sulfate by a factor of three. These mutants fall into the same complementation group, suggesting that the mutations are allelic. A second group of heparan sulfate biosynthetic mutants, consisting of cell lines 625, 668 and 679, produce undersulfated heparan sulfate and normal chondroitin sulfate. Treatment of the chains with nitrous acid should determine the position of the sulfate groups along the chain. These mutants may define a complementation group that is defective in the enzymes which modify the heparan sulfate chain. To increase the authors repertoire of heparan sulfate mutants, they are presently developing an in situ enzyme assay to screen colonies replica plated on filter discs for sulfotransferase defects

  16. Global source attribution of sulfate aerosol and its radiative forcing

    Science.gov (United States)

    Yang, Y.; Wang, H.; Smith, S.; Easter, R. C.; Ma, P. L.; Qian, Y.; Li, C.; Yu, H.; Rasch, P. J.

    2017-12-01

    Sulfate is an important aerosol that poses health risks and influences climate. Due to long-range atmospheric transport, local sulfate pollution could result from intercontinental influences, making domestic efforts of improving air quality inefficient. Accurate understanding of source attribution of sulfate and its radiative forcing is important for both regional air quality improvement and global climate mitigation. In this study, for the first time, a sulfur source-tagging capability is implemented in the Community Atmosphere Model (CAM5) to quantify the global source-receptor relationships of sulfate and its direct and indirect radiative forcing (DRF and IRF). Near-surface sulfate concentrations are mostly contributed by local emissions in regions with high emissions, while over regions with relatively low SO2 emissions, the near-surface sulfate is primarily attributed to non-local sources from long-range transport. The export of SO2 and sulfate from Europe contributes 20% of sulfate concentrations over North Africa, Russia and Central Asia. Sources from the Middle East account for 20% of sulfate over North Africa, Southern Africa and Central Asia in winter and autumn, and 20% over South Asia in spring. East Asia accounts for about 50% of sulfate over Southeast Asia in winter and autumn, 15% over Russia in summer, and 10% over North America in spring. South Asia contributes to 25% of sulfate over Southeast Asia in spring. Lifetime of aerosols, together with regional export, is found to determine regional air quality. The simulated global total sulfate DRF is -0.42 W m-2, with 75% contributed by anthropogenic sulfate and 25% contributed by natural sulfate. In the Southern Hemisphere tropics, dimethyl sulfide (DMS) contributes the most to the total DRF. East Asia has the largest contribution of 20-30% over the Northern Hemisphere mid- and high-latitudes. A 20% perturbation of sulfate and its precursor emissions gives a sulfate IRF of -0.44 W m-2. DMS has the

  17. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  18. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  19. Incorporation of 35S-sulfate and 3H-glucosamine into heparan and chondroitin sulfates during the cell cycle of B16-F10 cells

    International Nuclear Information System (INIS)

    Blair, O.C.; Sartorelli, A.C.

    1984-01-01

    Changes in glycosaminoglycan composition occurring during the cell cycle were determined in B16-F10 cells sorted flow cytometrically with respect to DNA content. Incorporation of 35 S-sulfate into heparan sulfate and chondroitin sulfate of unsorted and G1,S, and G2 +M sorted cells was determined following chondroitinase ABC or nitrous acid treatment; the incorporation into surface material was measured as the difference between the radioactivity of control and trypsin-treated cells. Incorporation of 35 S-sulfate and 3 H-glucosamine into cetyl pyridinium chloride (CPC)-precipitable material was characterized before and after chondroitinase or nitrous acid treatment by Sephadex G50 chromatography. Long-term (48 h) and short-term (1 h) labeling studies demonstrate that (a) the amount of total cellular chondroitin sulfate is greater than that of heparan sulfate, with larger amounts of unsulfated heparan than chondroitin being present; (b) the rate of turnover of heparan sulfate is greater than that of chondroitin sulfate; (c) greatest short-term incorporation of 3H-glucosamine into CPC-precipitable material occurs during S phase; and (d) the rate of turnover of both heparan sulfate and chondroitin sulfate is decreased in S phase relative to G1 and G2 + M

  20. Population-based study of ABCD2 score, carotid stenosis, and atrial fibrillation for early stroke prediction after transient ischemic attack: the North Dublin TIA study.

    LENUS (Irish Health Repository)

    Sheehan, Orla C

    2010-05-01

    Transient ischemic attack (TIA) etiologic data and the ABCD(2) score may improve early stroke risk prediction, but studies are required in population-based cohorts. We investigated the external validity of the ABCD(2) score, carotid stenosis, and atrial fibrillation for prediction of early recurrent stroke after TIA.

  1. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  2. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  3. Purification, structural characterization and antiproliferative properties of chondroitin sulfate/dermatan sulfate from tunisian fish skins.

    Science.gov (United States)

    Krichen, Fatma; Volpi, Nicola; Sila, Assaâd; Maccari, Francesca; Mantovani, Veronica; Galeotti, Fabio; Ellouz-Chaabouni, Semia; Bougatef, Ali

    2017-02-01

    Chondroitin sulfate/dermatan sulfate GAGs were extracted and purified from the skins of grey triggerfish (GTSG) and smooth hound (SHSG). The disaccharide composition produced by chondroitinase ABC treatment showed the presence of nonsulfated disaccharide, monosulfated disaccharides ΔDi6S and ΔDi4S, and disulfated disaccharides in different percentages. In particular, the nonsulfated disaccharide ΔDi0S of GTSG and SHSG were 3.5% and 5.5%, respectively, while monosulfated disaccharides ΔDi6S and ΔDi4S were evaluated to be 18.2%, 59% and 14.6%, 47.0%, respectively. Capillary elecrophoresis analysis of GTSG and SHSG contained 99.2% and 95.4% of chondroitin sulfate/dermatan sulfate, respectively. PAGE analysis showed a GTSG and SHSG having molecular masses with average values of 41.72KDa and 23.8KDa, respectively. HCT116 cell proliferation was inhibited (p<0.05) by 70.6% and 72.65% at 200μg/mL of GTSG and SHSG respectively. Both GTSG and SHSG demonstrated promising antiproliferative potential, which may be used as a novel, effective agent. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  5. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  6. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  7. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  10. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  11. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  12. Importance of sulfate radical anion formation and chemistry in heterogeneous OH oxidation of sodium methyl sulfate, the smallest organosulfate

    Directory of Open Access Journals (Sweden)

    K. C. Kwong

    2018-02-01

    Full Text Available Organosulfates are important organosulfur compounds present in atmospheric particles. While the abundance, composition, and formation mechanisms of organosulfates have been extensively investigated, it remains unclear how they transform and evolve throughout their atmospheric lifetime. To acquire a fundamental understanding of how organosulfates chemically transform in the atmosphere, this work investigates the heterogeneous OH radical-initiated oxidation of sodium methyl sulfate (CH3SO4Na droplets, the smallest organosulfate detected in atmospheric particles, using an aerosol flow tube reactor at a high relative humidity (RH of 85 %. Aerosol mass spectra measured by a soft atmospheric pressure ionization source (direct analysis in real time, DART coupled with a high-resolution mass spectrometer showed that neither functionalization nor fragmentation products are detected. Instead, the ion signal intensity of the bisulfate ion (HSO4− has been found to increase significantly after OH oxidation. We postulate that sodium methyl sulfate tends to fragment into a formaldehyde (CH2O and a sulfate radical anion (SO4 ⋅ − upon OH oxidation. The formaldehyde is likely partitioned back to the gas phase due to its high volatility. The sulfate radical anion, similar to OH radical, can abstract a hydrogen atom from neighboring sodium methyl sulfate to form the bisulfate ion, contributing to the secondary chemistry. Kinetic measurements show that the heterogeneous OH reaction rate constant, k, is (3.79 ± 0.19  ×  10−13 cm3 molecule−1 s−1 with an effective OH uptake coefficient, γeff, of 0.17 ± 0.03. While about 40 % of sodium methyl sulfate is being oxidized at the maximum OH exposure (1.27  ×  1012 molecule cm−3 s, only a 3 % decrease in particle diameter is observed. This can be attributed to a small fraction of particle mass lost via the formation and volatilization of formaldehyde. Overall, we

  13. Low levels of H2S may replace sulfate as sulfur source in sulfate-deprived onion

    NARCIS (Netherlands)

    Durenkamp, Mark; De Kok, LJ

    2005-01-01

    Onion (Allium cepa L.) was exposed to low levels of H2S in order to investigate to what extent H2S could be used as a sulfur source for growth under sulfate-deprived conditions. Sulfate deprivation for a two-week period resulted in a decreased biomass production of the shoot, a subsequently

  14. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  15. Sulfate radical-induced degradation of Acid Orange 7 by a new magnetic composite catalyzed peroxymonosulfate oxidation process

    International Nuclear Information System (INIS)

    Chen, Dan; Ma, Xiaolong; Zhou, Jizhi; Chen, Xi; Qian, Guangren

    2014-01-01

    Graphical abstract: Organic dyes could be absorbed on the surface of the composite or dispersed in the solution. Sulfate radicals (SO 4 · − ) generated by the synergistic reaction between peroxymonosulfate (PMS) and the composite, attacked the organic functional groups of the dyes molecules both adsorbed on the composite surface and dispersed in the solution, which resulted in the degradation of AO7 dye. - Highlights: • A new composite was synthesized successfully via microwave hydrothermal method. • The complete degradation in the system of FLCN and PMS can be achieved. • The catalytic behavior of FLCN can be reused at least for five times. • The AO7 degradation mechanism in the system of FLCN and PMS was demonstrated. - Abstract: We synthesized a novel magnetic composite, Fe 3 O 4 /Cu(Ni)Cr-LDH, as a heterogeneous catalyst for the degradation of organic dyes in the solution using sulfate radical-based advanced oxidation processes. The physicochemical properties of the composite synthesized via two-step microwave hydrothermal method were characterized by several techniques, such as X-ray diffraction (XRD), inductively coupled plasma (ICP), transmission electron microscopy (TEM) and vibrating sample magnetometer (VSM). The degradation tests were performed at 25 °C with Acid Orange 7 (AO7) initial concentration of 25 mg/L and AO7/peroxymonosulfate (PMS) molar ratio of 1:10, which showed that the complete degradation by Fe 3 O 4 /Cu 1.5 Ni 0.5 Cr-LDH could be achieved and the mineralization rate could reach 46%. PMS was activated by Cu (II) and Fe (II/III) of Fe 3 O 4 /Cu(Ni)Cr-LDH to generate sulfate radicals (SO 4 · − ). Subsequently, the organic functional groups of AO7 molecules were destroyed by sulfate radicals (SO 4 · − ), inducing the degradation of AO7. Moreover, the catalytic behavior of the catalysts could be reused five times. Therefore, our work suggested that the Fe 3 O 4 /Cu(Ni)Cr-LDH composite could be applied widely for the

  16. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  17. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  18. Sulfates on Mars: TES Observations and Thermal Inertia Data

    Science.gov (United States)

    Cooper, C. D.; Mustard, J. F.

    2001-05-01

    The high resolution thermal emission spectra returned by the TES spectrometer on the MGS spacecraft have allowed the mapping of a variety of minerals and rock types by different sets of researchers. Recently, we have used a linear deconvolution approach to compare sulfate-palagonite soil mixtures created in the laboratory with Martian surface spectra. This approach showed that a number of areas on Mars have spectral properties that match those of sulfate-cemented soils (but neither loose powder mixtures of sulfates and soils nor sand-sized grains of disaggregated crusted soils). These features do not appear to be caused by atmospheric or instrumental effects and are thus believed to be related to surface composition and texture. The distribution and physical state of sulfate are important pieces of information for interpreting surface processes on Mars. A number of different mechanisms could have deposited sulfate in surface layers. Some of these include evaporation of standing bodies of water, aerosol deposition of volcanic gases, hydrothermal alteration from groundwater, and in situ interaction between the atmosphere and soil. The areas on Mars with cemented sulfate signatures are spread across a wide range of elevations and are generally large in spatial scale. Some of the areas are associated with volcanic regions, but many are in dark red plains that have previously been interpreted as duricrust deposits. Our current work compares the distribution of sulfate-cemented soils as mapped by the spectral deconvolution approach with thermal inertia maps produced from both Viking and MGS-TES. Duricrust regions, interpreted from intermediate thermal inertia values, are large regions thought to be sulfate-cemented soils similar to coherent, sulfate-rich materials seen at the Viking lander sites. Our observations of apparent regions of cemented sulfate are also large in spatial extent. This scale information is important for evaluating formation mechanisms for the

  19. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  20. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  1. Planar ultra thin glass seals with optical fiber interface for monitoring tamper attacks on security eminent components

    Science.gov (United States)

    Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.

    2017-11-01

    Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.

  2. Development of affinity-based delivery of NGF from a chondroitin sulfate biomaterial.

    Science.gov (United States)

    Butterfield, Karen Chao; Conovaloff, Aaron W; Panitch, Alyssa

    2011-01-01

    Chondroitin sulfate is a major component of the extracellular matrix in both the central and peripheral nervous systems. Chondroitin sulfate is upregulated at injury, thus methods to promote neurite extension through chondroitin sulfate-rich matrices and synthetic scaffolds are needed. We describe the use of both chondroitin sulfate and a novel chondroitin sulfate-binding peptide to control the release of nerve growth factor. Interestingly, the novel chondroitin sulfate-binding peptide enhances the controlled release properties of the chondroitin sulfate gels. While introduction of chondroitin sulfate into a scaffold inhibits primary cortical outgrowth, the combination of chondroitin sulfate, chondroitin sulfate-binding peptide and nerve growth factor promotes primary cortical neurite outgrowth in chondroitin sulfate gels.

  3. Removal of Sulfate Ion From AN-107 by Evaporation

    International Nuclear Information System (INIS)

    GJ Lumetta; GS Klinger; DE Kurath; RL Sell; LP Darnell; LR Greenwood; CZ Soderquist; MJ Steele; MW Urie; JJ Wagner

    2000-01-01

    Hanford low-activity waste solutions contain sulfate, which can cause accelerated corrosion of the vitrification melter and unacceptable operating conditions. A method is needed to selectively separate sulfate from the waste. An experiment was conducted to evaluate evaporation for removing sulfate ion from Tank AN-107 low-activity waste. Two evaporation steps were performed. In the first step, the volume was reduced by 55% while in the second step, the liquid volume was reduced another 22%. Analysis of the solids precipitated during these evaporations revealed that large amounts of sodium nitrate and nitrite co-precipitated with sodium sulfate. Many other waste components precipitated as well. It can be concluded that sulfate removal by precipitation is not selective, and thus, evaporation is not a viable option for removing sulfate from the AN-107 liquid

  4. Xyloside-primed Chondroitin Sulfate/Dermatan Sulfate from Breast Carcinoma Cells with a Defined Disaccharide Composition Has Cytotoxic Effects in Vitro.

    Science.gov (United States)

    Persson, Andrea; Tykesson, Emil; Westergren-Thorsson, Gunilla; Malmström, Anders; Ellervik, Ulf; Mani, Katrin

    2016-07-08

    We previously reported that the xyloside 2-(6-hydroxynaphthyl) β-d-xylopyranoside (XylNapOH), in contrast to 2-naphthyl β-d-xylopyranoside (XylNap), specifically reduces tumor growth both in vitro and in vivo Although there are indications that this could be mediated by the xyloside-primed glycosaminoglycans (GAGs) and that these differ in composition depending on xyloside and cell type, detailed knowledge regarding a structure-function relationship is lacking. In this study we isolated XylNapOH- and XylNap-primed GAGs from a breast carcinoma cell line, HCC70, and a breast fibroblast cell line, CCD-1095Sk, and demonstrated that both XylNapOH- and XylNap-primed chondroitin sulfate/dermatan sulfate GAGs derived from HCC70 cells had a cytotoxic effect on HCC70 cells and CCD-1095Sk cells. The cytotoxic effect appeared to be mediated by induction of apoptosis and was inhibited in a concentration-dependent manner by the XylNap-primed heparan sulfate GAGs. In contrast, neither the chondroitin sulfate/dermatan sulfate nor the heparan sulfate derived from CCD-1095Sk cells primed on XylNapOH or XylNap had any effect on the growth of HCC70 cells or CCD-105Sk cells. These observations were related to the disaccharide composition of the XylNapOH- and XylNap-primed GAGs, which differed between the two cell lines but was similar when the GAGs were derived from the same cell line. To our knowledge this is the first report on cytotoxic effects mediated by chondroitin sulfate/dermatan sulfate. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  5. Techniques of sample attack used in soil and mineral analysis. Phase I

    International Nuclear Information System (INIS)

    Chiu, N.W.; Dean, J.R.; Sill, C.W.

    1984-07-01

    Several techniques of sample attack for the determination of radioisotopes are reviewed. These techniques include: 1) digestion with nitric or hydrochloric acid in Parr digestion bomb, 2) digestion with a mixture of nitric and hydrochloric acids, 3) digestion with a mixture of hydrofluoric, nitric and perchloric acids, and 4) fusion with sodium carbonate, potassium fluoride or alkali pyrosulfates. The effectiveness of these techniques to decompose various soils and minerals containing radioisotopes such as lead-210 uranium, thorium and radium-226 are discussed. The combined procedure of potassium fluoride fusion followed by alkali pyrosulfate fusion is recommended for radium-226, uranium and thorium analysis. This technique guarantees the complete dissolution of samples containing refractory materials such as silica, silicates, carbides, oxides and sulfates. For the lead-210 analysis, the procedure of digestion with a mixture of hydrofluoric, nitric and perchloric acids followed by fusion with alkali pyrosulfate is recommended. These two procedures are detailed. Schemes for the sequential separation of the radioisotopes from a dissolved sample solution are outlined. Procedures for radiochemical analysis are suggested

  6. Formation of the natural sulfate aerosol

    Energy Technology Data Exchange (ETDEWEB)

    Kerminen, V M; Hillamo, R; Maekinen, M; Virkkula, A; Maekelae, T; Pakkanen, T [Helsinki Univ. (Finland). Dept. of Physics

    1997-12-31

    Anthropogenic sulfate aerosol, together with particles from biomass burning, may significantly reduce the climatic warming due to man-made greenhouse gases. The radiative forcing of aerosol particles is based on their ability to scatter and absorb solar radiation (direct effect), and on their influences on cloud albedos and lifetimes (indirect effect). The direct aerosol effect depends strongly on the size, number and chemical composition of particles, being greatest for particles of 0.1-1 {mu}m in diameter. The indirect aerosol effect is dictated by the number of particles being able to act as cloud condensation nuclei (CCN). For sulfate particles, the minimum CCN size in tropospheric clouds is of the order of 0.05-0.2 {mu}m. To improve aerosol parameterizations in future climate models, it is required that (1) both primary and secondary sources of various particle types will be characterized at a greater accuracy, and (2) the influences of various atmospheric processes on the spatial and temporal distribution of these particles and their physico-chemical properties are known much better than at the present. In estimating the climatic forcing due to the sulfate particles, one of the major problems is to distinguish between sulfur from anthropogenic sources and that of natural origin. Global emissions of biogenic and anthropogenic sulfate pre-cursors are comparable in magnitude, but over regional scales either of these two source types may dominate. The current presentation is devoted to discussing the natural sulfate aerosol, including the formation of sulfur-derived particles in the marine environment, and the use of particulate methanesulfonic acid (MSA) as a tracer for the natural sulfate

  7. Formation of the natural sulfate aerosol

    Energy Technology Data Exchange (ETDEWEB)

    Kerminen, V.M.; Hillamo, R.; Maekinen, M.; Virkkula, A.; Maekelae, T.; Pakkanen, T. [Helsinki Univ. (Finland). Dept. of Physics

    1996-12-31

    Anthropogenic sulfate aerosol, together with particles from biomass burning, may significantly reduce the climatic warming due to man-made greenhouse gases. The radiative forcing of aerosol particles is based on their ability to scatter and absorb solar radiation (direct effect), and on their influences on cloud albedos and lifetimes (indirect effect). The direct aerosol effect depends strongly on the size, number and chemical composition of particles, being greatest for particles of 0.1-1 {mu}m in diameter. The indirect aerosol effect is dictated by the number of particles being able to act as cloud condensation nuclei (CCN). For sulfate particles, the minimum CCN size in tropospheric clouds is of the order of 0.05-0.2 {mu}m. To improve aerosol parameterizations in future climate models, it is required that (1) both primary and secondary sources of various particle types will be characterized at a greater accuracy, and (2) the influences of various atmospheric processes on the spatial and temporal distribution of these particles and their physico-chemical properties are known much better than at the present. In estimating the climatic forcing due to the sulfate particles, one of the major problems is to distinguish between sulfur from anthropogenic sources and that of natural origin. Global emissions of biogenic and anthropogenic sulfate pre-cursors are comparable in magnitude, but over regional scales either of these two source types may dominate. The current presentation is devoted to discussing the natural sulfate aerosol, including the formation of sulfur-derived particles in the marine environment, and the use of particulate methanesulfonic acid (MSA) as a tracer for the natural sulfate

  8. Improvement of the degradation of sulfate rich wastewater using sweetmeat waste (SMW) as nutrient supplement.

    Science.gov (United States)

    Das, Bidus Kanti; Roy, Shantonu; Dev, Subhabrata; Das, Debabrata; Bhattacharya, Jayanta

    2015-12-30

    External dosing of sweetmeat waste (SMW) dosing into exhausted upflow packed bed bioreactor (PBR) resulted in prompt reactivation of SO4(2-) removal. Different SMW concentrations in terms of chemical oxygen demand (COD)/SO4(2-) ratios (1, 2, 4 and 8) were introduced into four identical PBR where process stability was found within 3 weeks of operation. SO4(2-) removal was proportional to COD/SO4(2-) ratios up to 4 at which maximum sulfate removal (99%) was achieved at a rate of 607 mg/d. The value of COD consumption:SO4(2-)removal was much higher at ratio 4 than 8 whereas, ratio 2 was preferred over all. Net effluent acetate concentration profile and total microbial population attached to the reactor matrices were corresponding to COD/SO4(2-) ratio as 4>8>2>1. Sulfate reducing bacteria (SRB) population was found to be inversely proportional to COD/SO4(2-) ratio in which acetate oxidizing SRB and fermentative bacteria were the dominant. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  10. ROLE OF TYROSINE-SULFATED PROTEINS IN RETINAL STRUCTURE AND FUNCTION

    Science.gov (United States)

    Kanan, Y.; Al-Ubaidi, M.R.

    2014-01-01

    The extracellular matrix (ECM) plays a significant role in cellular and retinal health. The study of retinal tyrosine-sulfated proteins is an important first step toward understanding the role of ECM in retinal health and diseases. These secreted proteins are members of the retinal ECM. Tyrosine sulfation was shown to be necessary for the development of proper retinal structure and function. The importance of tyrosine sulfation is further demonstrated by the evolutionary presence of tyrosylprotein sulfotransferases, enzymes that catalyze proteins’ tyrosine sulfation, and the compensatory abilities of these enzymes. Research has identified four tyrosine-sulfated retinal proteins: fibulin 2, vitronectin, complement factor H (CFH), and opticin. Vitronectin and CFH regulate the activation of the complement system and are involved in the etiology of some cases of age-related macular degeneration. Analysis of the role of tyrosine sulfation in fibulin function showed that sulfation influences the protein's ability to regulate growth and migration. Although opticin was recently shown to exhibit anti-angiogenic properties, it is not yet determined what role sulfation plays in that function. Future studies focusing on identifying all of the tyrosine-sulfated retinal proteins would be instrumental in determining the impact of sulfation on retinal protein function in retinal homeostasis and diseases. PMID:25819460

  11. Glucosamine Sulfate

    Science.gov (United States)

    ... and becomes thin. This results in more joint friction, pain, and stiffness. Researchers think that taking glucosamine ... pregnant or breast-feeding. Asthma: There is one report linking an asthma attack with taking glucosamine. It ...

  12. A novel chondroitin sulfate hydrogel for nerve repair

    Science.gov (United States)

    Conovaloff, Aaron William

    Brachial plexus injuries affect numerous patients every year, with very debilitating results. The majority of these cases are very severe, and involve damage to the nerve roots. To date, repair strategies for these injuries address only gross tissue damage, but do not supply cells with adequate regeneration signals. As a result, functional recovery is often severely lacking. Therefore, a chondroitin sulfate hydrogel that delivers neurotrophic signals to damaged neurons is proposed as a scaffold to support nerve root regeneration. Capillary electrophoresis studies revealed that chondroitin sulfate can physically bind with a variety of neurotrophic factors, and cultures of chick dorsal root ganglia demonstrated robust neurite outgrowth in chondroitin sulfate hydrogels. Outgrowth in chondroitin sulfate gels was greater than that observed in control gels of hyaluronic acid. Furthermore, the chondroitin sulfate hydrogel's binding activity with nerve growth factor could be enhanced by incorporation of a synthetic bioactive peptide, as revealed by fluorescence recovery after photobleaching. This enhanced binding was observed only in chondroitin sulfate gels, and not in hyaluronic acid control gels. This enhanced binding activity resulted in enhanced dorsal root ganglion neurite outgrowth in chondroitin sulfate gels. Finally, the growth of regenerating dorsal root ganglia in these gels was imaged using label-free coherent anti-Stokes scattering microscopy. This technique generated detailed, high-quality images of live dorsal root ganglion neurites, which were comparable to fixed, F-actin-stained samples. Taken together, these results demonstrate the viability of this chondroitin sulfate hydrogel to serve as an effective implantable scaffold to aid in nerve root regeneration.

  13. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  14. Oxygen isotopic fractionation during bacterial sulfate reduction

    Science.gov (United States)

    Balci, N.; Turchyn, A. V.; Lyons, T.; Bruchert, V.; Schrag, D. P.; Wall, J.

    2006-12-01

    Sulfur isotope fractionation during bacterial sulfate reduction (BSR) is understood to depend on a variety of environmental parameters, such as sulfate concentration, temperature, cell specific sulfate reduction rates, and the carbon substrate. What controls oxygen isotope fractionation during BSR is less well understood. Some studies have suggested that carbon substrate is important, whereas others concluded that there is a stoichiometric relationship between the fractionations of sulfur and oxygen during BSR. Studies of oxygen fractionation are complicated by isotopic equilibration between sulfur intermediates, particularly sulfite, and water. This process can modify the isotopic composition of the extracellular sulfate pool (δ18OSO4 ). Given this, the challenge is to distinguish between this isotopic equilibration and fractionations linked to the kinetic effects of the intercellular enzymes and the incorporation of sulfate into the bacterial cell. The δ18OSO4 , in concert with the sulfur isotope composition of sulfate (δ34SSO4), could be a powerful tool for understanding the pathways and environmental controls of BSR in natural systems. We will present δ18OSO4 data measured from batch culture growth of 14 different species of sulfate reducing bacteria for which sulfur isotope data were previously published. A general observation is that δ18OSO4 shows little isotopic change (kinetic effect during BSR and/or equilibration between sulfur intermediates and the isotopically light water (~-5‰) of the growth medium. Our present batch culture data do not allow us to convincingly isolate the magnitude and the controlling parameters of the kinetic isotope effect for oxygen. However, ongoing growth of mutant bacteria missing enzymes critical in the different steps of BSR may assist in this mission.

  15. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  16. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  17. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  19. Bone sialoprotein II synthesized by cultured osteoblasts contains tyrosine sulfate

    International Nuclear Information System (INIS)

    Ecarot-Charrier, B.; Bouchard, F.; Delloye, C.

    1989-01-01

    Isolated mouse osteoblasts that retain their osteogenic activity in culture were incubated with [35S] sulfate. Two radiolabeled proteins, in addition to proteoglycans, were extracted from the calcified matrix of osteoblast cultures. All the sulfate label in both proteins was in the form of tyrosine sulfate as assessed by amino acid analysis and thin layer chromatography following alkaline hydrolysis. The elution behavior on DEAE-Sephacel of the major sulfated protein and the apparent Mr on sodium dodecyl sulfate gels were characteristic of bone sialoprotein II extracted from rat. This protein was shown to cross-react with an antiserum raised against bovine bone sialoprotein II, indicating that bone sialoprotein II synthesized by cultured mouse osteoblasts is a tyrosine-sulfated protein. The minor sulfated protein was tentatively identified as bone sialoprotein I or osteopontin based on its elution properties on DEAE-Sephacel and anomalous behavior on sodium dodecyl sulfate gels similar to those reported for rat bone sialoprotein I

  20. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  1. Pectin of Prunus domestica L. alters sulfated structure of cell-surface heparan sulfate in differentiated Caco-2 cells through stimulation of heparan sulfate 6-O-endosulfatase-2.

    Science.gov (United States)

    Nishida, Mitsutaka; Murata, Kazuma; Kanamaru, Yoshihiro; Yabe, Tomio

    2014-01-01

    Although previous reports have suggested that pectin induces morphological changes of the small intestine in vivo, the molecular mechanisms have not been elucidated. As heparan sulfate plays important roles in development of the small intestine, to verify the involvement of heparan sulfate (HS) in the pectin-induced morphological changes of the small intestine, the effects of pectin from Prunus domestica L. on cell-surface HS were investigated using differentiated Caco-2 cells. Disaccharide compositional analysis revealed that sulfated structures of HS were markedly changed by pectin administration. Real-time RT-PCR showed that pectin upregulated human HS 6-O-endosulfatase-2 (HSulf-2) expression and markedly inhibited HSulf-1 expression. Furthermore, inhibition analysis suggested that pretreatment with fibronectin III1C fragment, RGD peptide, and ERK1/2 inhibitor suppressed pectin-induced HSulf-2 expression. These observations indicate that pectin induced the expression of HSulf-2 through the interaction with fibronectin, α5β1 integrin, and ERK1/2, thereby regulating the sulfated structure of HS on differentiated Caco-2 cells.

  2. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  6. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  7. Heparan Sulfate and Chondroitin Sulfate Glycosaminoglycans Are Targeted by Bleomycin in Cancer Cells.

    Science.gov (United States)

    Li, Xiulian; Lan, Ying; He, Yanli; Liu, Yong; Luo, Heng; Yu, Haibo; Song, Ni; Ren, Sumei; Liu, Tianwei; Hao, Cui; Guo, Yunliang; Zhang, Lijuan

    2017-01-01

    Bleomycin is a clinically used anti-cancer drug that produces DNA breaks once inside of cells. However, bleomycin is a positively charged molecule and cannot get inside of cells by free diffusion. We previously reported that the cell surface negatively charged glycosaminoglycans (GAGs) may be involved in the cellular uptake of bleomycin. We also observed that a class of positively charged small molecules has Golgi localization once inside of the cells. We therefore hypothesized that bleomycin might perturb Golgi-operated GAG biosynthesis. We used stable isotope labeling coupled with LC/MS analysis of GAG disaccharides simultaneously from bleomycin-treated and non-treated cancer cells. To further understand the cytotoxicity of bleomycin and its relationship to GAGs, we used sodium chlorate to inhibit GAG sulfation and commercially available GAGs to compete for cell surface GAG/bleomycin interactions in seven cell lines including CHO745 defective in both heparan sulfate and chondroitin sulfate biosynthesis. we discovered that heparan sulfate GAG was significantly undersulfated and the quantity and disaccharide compositions of GAGs were changed in bleomycin-treated cells in a concentration- and time-dependent manner. We revealed that bleomycin-induced cytotoxicity was directly related to cell surface GAGs. GAGs were targeted by bleomycin both at cell surface and at Golgi. Thus, GAGs might be the biological relevant molecules that might be related to the bleomycin-induced fibrosis in certain cancer patients, a severe side effect with largely unknown molecular mechanism. © 2017 The Author(s). Published by S. Karger AG, Basel.

  8. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Ferric sulfates on Mars: Surface Explorations and Laboratory Experiments

    Science.gov (United States)

    Wang, A.; Ling, Z.; Freeman, J. J.

    2008-12-01

    Recent results from missions to Mars have reinforced the importance of sulfates for Mars science. They are the hosts of water, the sinks of acidity, and maybe the most active species in the past and current surface/near-surface processes on Mars. Fe-sulfate was found frequently by Spirit and Opportunity rovers: jarosite in Meridiani Planum outcrops and a less specific "ferric sulfate" in the salty soils excavated by Spirit at Gusev Crater. Pancam spectral analysis suggests a variety of ferric sulfates in these soils, i.e. ferricopiapite, jarosite, fibroferrite, and rhomboclase. A change in the Pancam spectral features occurred in Tyrone soils after ~ 190 sols of exposure to surface conditions. Dehydration of ferric sulfate is a possible cause. We synthesized eight ferric sulfates and conducted a series of hydration/dehydration experiments. Our goal was to establish the stability fields and phase transition pathways of these ferric sulfates. In our experiments, water activity, temperature, and starting structure are the variables. No redox state change was observed. Acidic, neutral, and basic salts were used. Ferric sulfate sample containers were placed into relative humidity buffer solutions that maintain static relative humidity levels at three temperatures. The five starting phases were ferricopiapite (Fe4.67(SO4)6(OH)2.20H2O), kornelite (Fe2(SO4)3.7H2O), rhomboclase (FeH(SO4)2.4H2O), pentahydrite (Fe2(SO4)3.5H2O), and an amorphous phase (Fe2(SO4)3.5H2O). A total of one hundred fifty experiments have been running for nearly ten months. Thousands of coupled Raman and gravimetric measurements were made at intermediate steps to monitor the phase transitions. The first order discovery from these experiments is the extremely large stability field of ferricopiapite. Ferricopiapite is the major ferric sulfate to precipitate from a Fe3+-S-rich aqueous solution at mid-low temperature, and it has the highest H2O/Fe ratio (~ 4.3). However, unlike the Mg-sulfate with highest

  11. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  12. Desulfovibrio zosterae sp. nov., a new sulfate reducer isolated from surface-sterilized roots of the seagrass Zostera marina.

    Science.gov (United States)

    Nielsen, J T; Liesack, W; Finster, K

    1999-04-01

    A sulfate-reducing bacterium, designated strain lacT, was isolated from surface-sterilized roots of the benthic macrophyte Zostera marina. Cells were motile by means of a single polar flagellum. Strain lacT utilized lactate, pyruvate, malate, ethanol, L-alanine, fumarate, choline and fructose with sulfate as electron acceptor. In addition, fumarate, pyruvate and fructose were also degraded without an external electron acceptor. Sulfate could be substituted with thiosulfate, sulfite and elemental sulfur. Optimal growth was observed between 32.5 and 34.5 degrees C, at an NaCl concentration of 0.2 M and in a pH range between 6.8 and 7.3. The G + C content of the DNA was 42.7 +/- 0.2 mol%. Desulfoviridin and catalase were present. Strain lacT contained c-type cytochromes. Comparative 16S rRNA gene sequence analysis and the fatty acid pattern grouped this isolate into the genus Desulfovibrio. However, strain lacT differs from all other described Desulfovibrio species on the bases of its 16S rRNA gene sequence, the G + C content, its cellular lipid pattern and the utilization pattern of substrates. These characteristics establish strain lacT (= DSM 11974T) as a novel species of the genus Desulfovibrio, for which the name Desulfovibrio zosterae sp. nov. is proposed.

  13. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  14. Ferrous Sulfate (Iron)

    Science.gov (United States)

    ... are allergic to ferrous sulfate, any other medications tartrazine (a yellow dye in some processed foods and ... in, tightly closed, and out of reach of children. Store it at room temperature and away from ...

  15. DEPENDENCY OF SULFATE SOLUBILITY ON MELT COMPOSITION AND MELT POLYMERIZATION

    International Nuclear Information System (INIS)

    JANTZEN, CAROL M.

    2004-01-01

    Sulfate and sulfate salts are not very soluble in borosilicate waste glass. When sulfate is present in excess it can form water soluble secondary phases and/or a molten salt layer (gall) on the melt pool surface which is purported to cause steam explosions in slurry fed melters. Therefore, sulfate can impact glass durability while formation of a molten salt layer on the melt pool can impact processing. Sulfate solubility has been shown to be compositionally dependent in various studies, (e.g. , B2O3, Li2O, CaO, MgO, Na2O, and Fe2O3 were shown to increase sulfate solubility while Al2O3 and SiO2 decreased sulfate solubility). This compositional dependency is shown to be related to the calculated melt viscosity at various temperatures and hence the melt polymerization

  16. Sulfated glycosaminoglycans in human vocal fold lamina propria

    Directory of Open Access Journals (Sweden)

    Sung Woo Park

    Full Text Available Abstract Introduction: The distribution, concentration and function of glycosaminoglycans in the various vocal fold tissues are still unclear. Objective: To evaluate the distribution and concentration of sulfated glycosaminoglycans in different layers of the human vocal fold according to gender and age. Methods: We used 11 vocal folds obtained from cadavers (7 men and 4 women with no laryngeal lesion, less than 12 h after death, and aged between 35 and 98 years. The folds underwent glycosaminoglycans extraction from the cover and ligament, and post-electrophoresis analysis. Data were compared according to the layer, age and gender. Results: The concentration of dermatan sulfate was significantly higher in all layers. No differences were observed in the total concentrations of glycosaminoglycans in layers studied according to gender. It is significantly lower in the cover of individuals aged below 60 years. Conclusion: Dermatan sulfate, chondroitin sulfate, and heparan sulfate were observed in the human vocal folds cover and ligament of both genders, with the concentration of dermatan sulfate being significantly higher in all layers. Glycosaminoglycans concentration on the cover is significantly lower in individuals below 60 years compared with elderly.

  17. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  18. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  1. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  2. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  3. DHEA-sulfate test

    Science.gov (United States)

    ... DHEA sulfate may be due to: Adrenal gland disorders that produce lower than normal amounts of adrenal hormones, including adrenal insufficiency and Addison disease The pituitary gland not producing normal amounts of its hormones ( hypopituitarism ) ...

  4. Selenium inhibits sulfate-mediated methylmercury production in rice paddy soil.

    Science.gov (United States)

    Wang, Yong-Jie; Dang, Fei; Zhao, Jia-Ting; Zhong, Huan

    2016-06-01

    There is increasing interest in understanding factors controlling methylmercury (MeHg) production in mercury-contaminated rice paddy soil. Sulfate has been reported to affect MeHg biogeochemistry under anoxic conditions, and recent studies revealed that selenium (Se) could evidently reduce MeHg production in paddy soil. However, the controls of sulfate and Se on net MeHg production in paddy soil under fluctuating redox conditions remain largely unknown. Microcosm experiments were conducted to explore the effects of sulfate and Se on net MeHg production in rice paddy soil. Soil was added with 0-960 mg/kg sulfate, in the presence or absence of 3.0 mg/kg selenium (selenite or selenate), and incubated under anoxic (40 days) or suboxic conditions (5 days), simulating fluctuating redox conditions in rice paddy field. Sulfate addition moderately affected soil MeHg concentrations under anoxic conditions, while reoxidation resulted in evidently higher (18-40%) MeHg levels in sulfate amended soils than the control. The observed changes in net MeHg production were related to dynamics of sulfate and iron. However, Se could inhibit sulfate-mediated MeHg production in the soils: Se addition largely reduced net MeHg production in the soils (23-86%, compared to the control), despite of sulfate addition. Similarly, results of the pot experiments (i.e., rice cultivation in amended soils) indicated that soil MeHg levels were rather comparable in Se-amended soils during rice growth period, irrespective of added sulfate doses. The more important role of Se than sulfate in controlling MeHg production was explained by the formation of HgSe nanoparticles irrespective of the presence of sulfate, confirmed by TEM-EDX and XANES analysis. Our findings regarding the effects of sulfate and Se on net MeHg production in rice paddy soil together with the mechanistic explanation of the processes advance our understanding of MeHg dynamics and risk in soil-rice systems. Copyright © 2016 Elsevier

  5. Extraction of uranyl sulfate with primary amine

    International Nuclear Information System (INIS)

    Mrnka, M.; Bizek, V.; Nekovar, P.; Cizevska, S.; Schroetterova, D.

    1984-01-01

    PRIMENE JM-T was used for extraction. Its composition was found to approach the general formula C 21 H 43 NH 2 . It was found that the extraction of uranyl sulfate is lower in case of a higher steady-state concentration of sulfuric acid in the aqueous phase. Extraction is accompanied with coextraction of water. The results obtained showed that uranyl sulfate passes into the organic phase by two mechanisms: extraction with amine sulfate and extraction with free amine. A mathematical description of the process was made based on the obtained results. (E.S.)

  6. Biological functions of iduronic acid in chondroitin/dermatan sulfate.

    Science.gov (United States)

    Thelin, Martin A; Bartolini, Barbara; Axelsson, Jakob; Gustafsson, Renata; Tykesson, Emil; Pera, Edgar; Oldberg, Åke; Maccarana, Marco; Malmstrom, Anders

    2013-05-01

    The presence of iduronic acid in chondroitin/dermatan sulfate changes the properties of the polysaccharides because it generates a more flexible chain with increased binding potentials. Iduronic acid in chondroitin/dermatan sulfate influences multiple cellular properties, such as migration, proliferation, differentiation, angiogenesis and the regulation of cytokine/growth factor activities. Under pathological conditions such as wound healing, inflammation and cancer, iduronic acid has diverse regulatory functions. Iduronic acid is formed by two epimerases (i.e. dermatan sulfate epimerase 1 and 2) that have different tissue distribution and properties. The role of iduronic acid in chondroitin/dermatan sulfate is highlighted by the vast changes in connective tissue features in patients with a new type of Ehler-Danlos syndrome: adducted thumb-clubfoot syndrome. Future research aims to understand the roles of the two epimerases and their interplay with the sulfotransferases involved in chondroitin sulfate/dermatan sulfate biosynthesis. Furthermore, a better definition of chondroitin/dermatan sulfate functions using different knockout models is needed. In this review, we focus on the two enzymes responsible for iduronic acid formation, as well as the role of iduronic acid in health and disease. © 2013 The Authors Journal compilation © 2013 FEBS.

  7. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  8. Bicarbonate sulfate exchange in canalicular rat liver plasma membrane vesicles

    International Nuclear Information System (INIS)

    Meier, P.J.; Valantinas, J.; Hugentobler, G.; Rahm, I.

    1987-01-01

    The mechanism(s) and driving forces for biliary excretion of sulfate were investigated in canalicular rat liver plasma membrane vesicles (cLPM). Incubation of cLPM vesicles in the presence of an inside-to-outside (in, out) bicarbonate gradient but not pH or out-to-in sodium gradients, stimulated sulfate uptake 10-fold compared with the absence of bicarbonate and approximately 2-fold above sulfate equilibrium (overshoot). Initial rates of this bicarbonate gradient-driven [ 35 S]-sulfate uptake were saturable with increasing concentrations of sulfate and could be inhibited by probenecid, N-(4-azido-2-nitrophenyl)-2-aminoethylsulfonate, acetazolamide, furosemide, 4-acetamideo-4'-isothiocyanostilbene-2,2'-disulfonic acid, and 4,4'-diisothiocyanostilbene-2,2'-disulfonic acid (IC 50 , ∼40 μM). Cisinhibition of initial bicarbonate gradient-stimulated sulfate uptake and transstimulation of sulfate uptake in the absence of bicarbonate were observed with sulfate, thiosulfate, and oxalate but not with chloride, nitrate, phosphate, acetate, lactate, glutamate, aspartate, cholate, taurocholate, dehydrocholate, taurodehydrocholate, and reduced or oxidized glutathione. These findings indicate the presence of a sulfate (oxalate)-bicarbonate anion exchange system in canalicular rat liver plasma membranes. These findings support the concept that bicarbonate-sensitive transport system might play an important role in bile acid-independent canalicular bile formation

  9. The anaerobic treatment of sulfate containing wastewater

    NARCIS (Netherlands)

    Visser, A.

    1995-01-01


    In the anaerobic treatment of sulfate containing wastewater sulfate reducing bacteria (SRB) will compete with methanogenic- (MB) and acetogenic bacteria (AB) for the available substrates such as hydrogen, acetate, propionate and butyrate. The outcome of this competition will

  10. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  12. Effect of light, carbon dioxide, and nitrogen nutrition on the incorporation of S from external sulfate into different S-containing fractions in Scenedesmus, with special reference to lipid S

    Energy Technology Data Exchange (ETDEWEB)

    Kylin, A

    1966-01-01

    Incorporation of S from the sulfate in the medium into normal cells of Scenedesmus was enhanced by light, relatively most in the case of lipid S and least in the inorganic sulfate fraction. The effects of light were, generally, increased by the presence of CO/sub 2/ and nitrogen salts. CO/sub 2/ did not significantly alter the proportions between the fractions, but the presence of nitrogen increased the formation of protein S more than the synthesis of S-containing lipids. It is suggested that lipid S is formed as a sink, when a step between sulfite and -SH becomes increasingly rate-limiting in the overall reduction of sulfate. Furthermore, incorporation as SO/sub 4//sup 2 -/ and as lipid S may be regulated by more or less independent processes. 15 references, 2 tables.

  13. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  14. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  15. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  16. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  17. Extraction of beryllium sulfate by a long chain amine

    International Nuclear Information System (INIS)

    Etaix, E.S.

    1968-01-01

    The extraction of sulfuric acid in aqueous solution by a primary amine in benzene solution, 3-9 (diethyl) - 6-amino tri-decane (D.E.T. ) - i.e., with American nomenclature 1-3 (ethyl-pentyl) - 4-ethyl-octyl amine (E.P.O.) - has made it possible to calculate the formation constants of alkyl-ammonium sulfate and acid sulfate. The formula of the beryllium and alkyl-ammonium sulfate complex formed in benzene has next been determined, for various initial acidity of the aqueous solution. Lastly, evidence has been given of negatively charged complexes of beryllium and sulfate in aqueous solution, through the dependence of the aqueous sulfate ions concentration upon beryllium extraction. The formation constant of these anionic complexes has been evaluated. (author) [fr

  18. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  19. Stress corrosion cracking of an aluminum alloy used in external fixation devices.

    Science.gov (United States)

    Cartner, Jacob L; Haggard, Warren O; Ong, Joo L; Bumgardner, Joel D

    2008-08-01

    Treatment for compound and/or comminuted fractures is frequently accomplished via external fixation. To achieve stability, the compositions of external fixators generally include aluminum alloy components due to their high strength-to-weight ratios. These alloys are particularly susceptible to corrosion in chloride environments. There have been several clinical cases of fixator failure in which corrosion was cited as a potential mechanism. The aim of this study was to evaluate the effects of physiological environments on the corrosion susceptibility of aluminum 7075-T6, since it is used in orthopedic external fixation devices. Electrochemical corrosion curves and alternate immersion stress corrosion cracking tests indicated aluminum 7075-T6 is susceptible to corrosive attack when placed in physiological environments. Pit initiated stress corrosion cracking was the primary form of alloy corrosion, and subsequent fracture, in this study. Anodization of the alloy provided a protective layer, but also caused a decrease in passivity ranges. These data suggest that once the anodization layer is disrupted, accelerated corrosion processes occur. (c) 2007 Wiley Periodicals, Inc.

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  1. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  2. Sulfate reduction and methanogenesis at a freshwater

    DEFF Research Database (Denmark)

    Iversen, Vibeke Margrethe Nyvang; Andersen, Martin Søgaard; Jakobsen, Rasmus

    The freshwater-seawater interface was studied in a ~9-m thick anaerobic aquifer located in marine sand and gravel with thin peat lenses. Very limited amounts of iron-oxides are present. Consequently, the dominating redox processes are sulfate reduction and methanogenesis, and the groundwater...... is enriched in dissolved sulfide, methane and bicarbonate. Under normal conditions the seawater-freshwater interface is found at a depth of 4 m at the coastline and reaches the bottom of the aquifer 40 m inland. However, occasional flooding of the area occurs, introducing sulfate to the aquifer. Groundwater...... chemistry was studied in a 120 m transect perpendicular to the coast. Cores were taken for radiotracer rate measurements of sulfate reduction and methanogenesis. In the saline part of the aquifer 35 m inland, sulfate reduction was the dominant process with rates of 0.1-10 mM/year. In the freshwater part 100...

  3. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  4. COMPARISON OF UASB AND FLUIDIZED-BED REACTORS FOR SULFATE REDUCTION

    Directory of Open Access Journals (Sweden)

    S. M. Bertolino

    2015-03-01

    Full Text Available Abstract Reactor hydrodynamics is important for sulfidogenesis because sulfate reduction bacteria (SRB do not granulate easily. In this work, the sulfate reduction performance of two continuous anaerobic bioreactors was investigated: (i an upflow anaerobic sludge blanket (UASB reactor and (ii a fluidized bed reactor (FBR. Organic loading, sulfate reduction, and COD removal were the main parameters monitored during lactate and glycerol degradation. The UASB reactor with biomass recirculation showed a specific sulfate reduction rate of 0.089±0.014 g.gSSV-1.d-1 (89% reduction, whereas values twice as high were achieved in the FBR treating either lactate (0.200±0.017 g.gSSV-1.d-1 or glycerol (0.178±0.010 g.gSSV-1.d-1. Sulfate reduction with pure glycerol produced a smaller residual COD (1700 mg.L-1 than that produced with lactate (2500 mg.L-1 at the same COD.sulfate-1 mass ratio. It was estimated that 50% of glycerol degradation was due to sulfate reduction and 50% to fermentation, which was supported by the presence of butyrate in the FBR effluent. The UASB reactor was unable to produce effluents with sulfate concentrations below 250 mg.L-1 due to poor mixing conditions, whereas the FBR consistently ensured residual sulfate concentrations below such a value.

  5. On the sulfation of O-desmethyltramadol by human cytosolic sulfotransferases.

    Science.gov (United States)

    Rasool, Mohammed I; Bairam, Ahsan F; Kurogi, Katsuhisa; Liu, Ming-Cheh

    2017-10-01

    Previous studies have demonstrated that sulfate conjugation is involved in the metabolism of the active metabolite of tramadol, O-desmethyltramadol (O-DMT). The current study aimed to systematically identify the human cytosolic sulfotransferases (SULTs) that are capable of mediating the sulfation of O-DMT. The sulfation of O-DMT under metabolic conditions was demonstrated using HepG2 hepatoma cells and Caco-2 human colon carcinoma cells. O-DMT-sulfating activity of thirteen known human SULTs and four human organ specimens was examined using an established sulfotransferase assay. pH-Dependency and kinetic parameters were also analyzed using, respectively, buffers at different pHs and varying O-DMT concentrations in the assays. Of the thirteen human SULTs tested, only SULT1A3 and SULT1C4 were found to display O-DMT-sulfating activity, with different pH-dependency profiles. Kinetic analysis revealed that SULT1C4 was 60 times more catalytically efficient in mediating the sulfation of O-DMT than SULT1A3 at respective optimal pH. Of the four human organ specimens tested, the cytosol prepared from the small intestine showed much higher O-DMT-sulfating activity than cytosols prepared from liver, lung, and kidney. Both cultured HepG2 and Caco-2 cells were shown to be capable of sulfating O-DMT and releasing sulfated O-DMT into cultured media. SULT1A3 and SULT1C4 were the major SULTs responsible for the sulfation of O-DMT. Collectively, the results obtained provided a molecular basis underlying the sulfation of O-DMT and contributed to a better understanding about the pharmacokinetics and pharmacodynamics of tramadol in humans. Copyright © 2017 Institute of Pharmacology, Polish Academy of Sciences. Published by Elsevier Urban & Partner Sp. z o.o. All rights reserved.

  6. Chlorate: a reversible inhibitor of proteoglycan sulfation

    International Nuclear Information System (INIS)

    Humphries, D.E.; Silbert, J.E.

    1988-01-01

    Bovine aorta endothelial cells were cultured in medium containing [ 3 H]glucosamine, [ 35 S]sulfate, and various concentrations of chlorate. Cell growth was not affected by 10 mM chlorate, while 30 mM chlorate had a slight inhibitory effect. Chlorate concentrations greater than 10 mM resulted in significant undersulfation of chondroitin. With 30 mM chlorate, sulfation of chondroitin was reduced to 10% and heparan to 35% of controls, but [ 3 H]glucosamine incorporation on a per cell basis did not appear to be inhibited. Removal of chlorate from the culture medium of cells resulted in the rapid resumption of sulfation

  7. Flexural Behavior of High-Volume Steel Fiber Cementitious Composite Externally Reinforced with Basalt FRP Sheet

    Directory of Open Access Journals (Sweden)

    Seungwon Kim

    2016-01-01

    Full Text Available High-performance fiber-reinforced cementitious composites (HPFRCCs are characterized by unique tensile strain hardening and multiple microcracking behaviors. The HPFRCC, which demonstrates remarkable properties such as strength, ductility, toughness, durability, stiffness, and thermal resistance, is a class of fiber cement composite with fine aggregates. It can withstand tensile stresses by forming distributed microcracks owing to the embedded fibers in the concrete, which improve the energy absorption capacity and apparent ductility. This high energy absorbing capacity can be enhanced further by an external stiff fiber-reinforced polymer (FRP. Basalt fabric is externally bonded as a sheet on concrete materials to enhance the durability and resistance to fire and other environmental attacks. This study investigates the flexural performance of an HPFRCC that is externally reinforced with multiple layers of basalt FRP. The HPFRCC considered in the study contains steel fibers at a volume fraction of 8%.

  8. Antifouling potential of Nature-inspired sulfated compounds

    Science.gov (United States)

    Almeida, Joana R.; Correia-da-Silva, Marta; Sousa, Emília; Antunes, Jorge; Pinto, Madalena; Vasconcelos, Vitor; Cunha, Isabel

    2017-02-01

    Natural products with a sulfated scaffold have emerged as antifouling agents with low or nontoxic effects to the environment. In this study 13 sulfated polyphenols were synthesized and tested for antifouling potential using the anti-settlement activity of mussel (Mytilus galloprovincialis) plantigrade post-larvae and bacterial growth inhibition towards four biofilm-forming bacterial strains. Results show that some of these Nature-inspired compounds were bioactive, particularly rutin persulfate (2), 3,6-bis(β-D-glucopyranosyl) xanthone persulfate (6), and gallic acid persulfate (12) against the settlement of plantigrades. The chemical precursors of sulfated compounds 2 and 12 were also tested for anti-settlement activity and it was possible to conclude that bioactivity is associated with sulfation. While compound 12 showed the most promising anti-settlement activity (EC50 = 8.95 μg.mL-1), compound 2 also caused the higher level of growth inhibition in bacteria Vibrio harveyi (EC20 = 12.5 μg.mL-1). All the three bioactive compounds 2, 6, and 12 were also found to be nontoxic to the non target species Artemia salina ( 1000 μg.mL-1). This study put forward the relevance of synthesizing non-natural sulfated small molecules to generate new nontoxic antifouling agents.

  9. Acidity enhancement of niobia by sulfation: An experimental and DFT study

    International Nuclear Information System (INIS)

    Rocha, Angela S.; Costa, Gustavo C.; Tamiasso-Martinhon, Priscila; Sousa, Célia; Rocha, Alexandre B.

    2017-01-01

    Acidic solids are used as catalyst at several industrial processes and studies to improve their activities have been developed by different groups. One method well known is sulfating oxide to create new acid sites, but investigations about sulfated niobia are still scarce. This work studied the influence of sulfation on the niobia acidity by using a very simple reaction model, the esterification of acetic acid with ethanol, performed at 60 °C and 1 atm. Niobia and sulfated niobia samples were characterized by N 2 adsorption, X-ray diffraction, FTIR and titration with n-butylamine. To investigate the nature of sulfate groups formed on the surface of niobia, calculations based on the Density Functional Theory (DFT) have been performed for two models: pure niobia with hydroxylated surface and sulfated niobia where one OH − surface group was replaced by a HSO 4 − . The experimental results indicated that the sulfation treatment leads to an increase in the specific surface area, acidity and, consequently, in the activity of niobia, with small changes in the crystal structure of the solid. The presence of sulfate groups was evidenced by FTIR spectra and calculations have indicated HSO 4 − species bounded to the surface. Density Functional Perturbation Theory (DFPT) was also employed to obtain infrared intensities in the region of sulfate vibration bands. - Highlights: • Sulfation treatment has improved the acidity of niobium oxide. • A sulfate group on niobia (T-Nb 2 O 5 ) was proposed using DFT method. • Niobia and sulfated niobia are used for esterification of acetic acid with ethanol.

  10. A multi-analytical approach to better assess the keratan sulfate contamination in animal origin chondroitin sulfate.

    Science.gov (United States)

    Restaino, Odile Francesca; Finamore, Rosario; Diana, Paola; Marseglia, Mariacarmela; Vitiello, Mario; Casillo, Angela; Bedini, Emiliano; Parrilli, Michelangelo; Corsaro, Maria Michela; Trifuoggi, Marco; De Rosa, Mario; Schiraldi, Chiara

    2017-03-15

    Chondroitin sulfate is a glycosaminoglycan widely used as active principle of anti-osteoarthritis drugs and nutraceuticals, manufactured by extraction from animal cartilaginous tissues. During the manufacturing procedures, another glycosaminoglycan, the keratan sulfate, might be contemporarily withdrawn, thus eventually constituting a contaminant difficult to be determined because of its structural similarity. Considering the strict regulatory rules on the pureness of pharmaceutical grade chondrotin sulfate there is an urgent need and interest to determine the residual keratan sulfate with specific, sensitive and reliable methods. To pursue this aim, in this paper, for the first time, we set up a multi-analytical and preparative approach based on: i) a newly developed method by high performance anion-exchange chromatography with pulsed amperometric detection, ii) gas chromatography-mass spectrometry analyses, iii) size exclusion chromatography analyses coupled with triple detector array module and on iv) strong anion exchange chromatography separation. Varied KS percentages, in the range from 0.1 to 19.0% (w/w), were determined in seven pharmacopeia and commercial standards and nine commercial samples of different animal origin and manufacturers. Strong anion exchange chromatography profiles of the samples showed three or four different peaks. These peaks analyzed by high performance anion-exchange with pulsed amperometric detection and size exclusion chromatography with triple detector array, ion chromatography and by mono- or two-dimensional nuclear magnetic resonance revealed a heterogeneous composition of both glycosaminoglycans in terms of sulfation grade and molecular weight. High molecular weight species (>100 KDa) were also present in the samples that counted for chains still partially linked to a proteoglycan core. Copyright © 2016 The Author(s). Published by Elsevier B.V. All rights reserved.

  11. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  12. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  13. Sulfate reduction in an entrained-flow black liquor gasifier

    Energy Technology Data Exchange (ETDEWEB)

    Kymaelaeinen, M.; Janka, K. [Tampella Power, Tampere (Finland); Frederick, W.J.; Littau, M.; Sricharoenchaikul, V.; Jivakanun, N.; Waag, K. [Oregon State Univ., Corvallis, OR (United States). Dept. of Chemical Engineering

    1995-12-31

    Sulfate reduction and carbon conversion during pyrolysis and gasification of black liquor particles were experimentally studied in a laminar entrained-flow reactor. A model was also developed to simulate an entrained-flow black liquor gasifier. Experimental results were then compared to model calculations. Results indicated that carbon must be present to get a high degree of sulfate reduction during gasification. It is therefore important to balance the rates of carbon conversion and sulfate reduction. High local temperatures in the reactor should be avoided so that carbon does not convert too rapidly, but temperatures of nearly 1000 degrees C are required to achieve good sulfate reduction. It was suggested that a new equation was needed to adequately predict sulfate reduction in an entrained-flow black liquor gasifier. 12 refs., 8 figs., 5 tabs.

  14. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  16. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  18. Development of affinity-based delivery of NGF from a chondroitin sulfate biomaterial

    OpenAIRE

    Butterfield, Karen Chao; Conovaloff, Aaron W.; Panitch, Alyssa

    2011-01-01

    Chondroitin sulfate is a major component of the extracellular matrix in both the central and peripheral nervous systems. Chondroitin sulfate is upregulated at injury, thus methods to promote neurite extension through chondroitin sulfate-rich matrices and synthetic scaffolds are needed. We describe the use of both chondroitin sulfate and a novel chondroitin sulfate-binding peptide to control the release of nerve growth factor. Interestingly, the novel chondroitin sulfate-binding peptide enhanc...

  19. Localized sulfate-reducing zones in a coastal plain aquifer

    Science.gov (United States)

    Brown, C.J.; Coates, J.D.; Schoonen, M.A.A.

    1999-01-01

    High concentrations of dissolved iron in ground water of coastal plain or alluvial aquifers contribute to the biofouling of public supply wells for which treatment and remediation is costly. Many of these aquifers, however, contain zones in which microbial sulfate reduction and the associated precipitation of iron-sulfide minerals decreases iron mobility. The principal water-bearing aquifer (Magothy Aquifer of Cretaceous age) in Suffolk County, New York, contains localized sulfate-reducing zones in and near lignite deposits, which generally are associated with clay lenses. Microbial analyses of core samples amended with [14C]-acetate indicate that microbial sulfate reduction is the predominant terminal-electron-accepting process (TEAP) in poorly permeable, lignite-rich sediments at shallow depths and near the ground water divide. The sulfate-reducing zones are characterized by abundant lignite and iron-sulfide minerals, low concentrations of Fe(III) oxyhydroxides, and by proximity to clay lenses that contain pore water with relatively high concentrations of sulfate and dissolved organic carbon. The low permeability of these zones and, hence, the long residence time of ground water within them, permit the preservation and (or) allow the formation of iron-sulfide minerals, including pyrite and marcasite. Both sulfate-reducing bacteria (SRB) and iron-reducing bacteria (IRB) are present beneath and beyond the shallow sulfate-reducing zones. A unique Fe(III)-reducing organism, MD-612, was found in core sediments from a depth of 187 m near the southern shore of Long Island. The distribution of poorly permeable, lignite-rich, sulfate-reducing zones with decreased iron concentration is varied within the principal aquifer and accounts for the observed distribution of dissolved sulfate, iron, and iron sulfides in the aquifer. Locating such zones for the placement of production wells would be difficult, however, because these zones are of limited aerial extent.

  20. Evolutionary relationships and functional diversity of plant sulfate transporters

    Directory of Open Access Journals (Sweden)

    Hideki eTakahashi

    2012-01-01

    Full Text Available Sulfate is an essential nutrient cycled in nature. Ion transporters that specifically facilitate the transport of sulfate across the membranes are found ubiquitously in living organisms. The phylogenetic analysis of known sulfate transporters and their homologous proteins from eukaryotic organisms indicate two evolutionarily distinct groups of sulfate transport systems. One major group named Tribe 1 represents yeast and fungal SUL, plant SULTR and animal SLC26 families. The evolutionary origin of SULTR family members in land plants and green algae is suggested to be common with yeast and fungal sulfate transporters (SUL and animal anion exchangers (SLC26. The lineage of plant SULTR family is expanded into four subfamilies (SULTR1 to SULTR4 in land plant species. By contrast, the putative SULTR homologues from Chlorophyte green algae are in two separate lineages; one with the subfamily of plant tonoplast-localized sulfate transporters (SULTR4, and the other diverged before the appearance of lineages for SUL, SULTR and SLC26. There also was a group of yet undefined members of putative sulfate transporters in yeast and fungi divergent from these major lineages in Tribe 1. The other distinct group is Tribe 2, primarily composed of animal sodium-dependent sulfate/carboxylate transporters (SLC13 and plant tonoplast-localized dicarboxylate transporters (TDT. The putative sulfur-sensing protein (SAC1 and SAC1-like transporters (SLT of Chlorophyte green algae, bryophyte and lycophyte show low degrees of sequence similarities with SLC13 and TDT. However, the phylogenetic relationship between SAC1/SLT and the other two families, SLC13 and TDT in Tribe 2, is not clearly supported. In addition, the SAC1/SLT family is completely absent in the angiosperm species analyzed. The present study suggests distinct evolutionary trajectories of sulfate transport systems for land plants and green algae.

  1. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  2. Tyrosine sulfation modulates activity of tick-derived thrombin inhibitors

    Science.gov (United States)

    Thompson, Robert E.; Liu, Xuyu; Ripoll-Rozada, Jorge; Alonso-García, Noelia; Parker, Benjamin L.; Pereira, Pedro José Barbosa; Payne, Richard J.

    2017-09-01

    Madanin-1 and chimadanin are two small cysteine-free thrombin inhibitors that facilitate blood feeding in the tick Haemaphysalis longicornis. Here, we report a post-translational modification—tyrosine sulfation—of these two proteins that is critical for potent anti-thrombotic and anticoagulant activity. Inhibitors produced in baculovirus-infected insect cells displayed heterogeneous sulfation of two tyrosine residues within each of the proteins. One-pot ligation-desulfurization chemistry enabled access to homogeneous samples of all possible sulfated variants of the proteins. Tyrosine sulfation of madanin-1 and chimadanin proved crucial for thrombin inhibitory activity, with the doubly sulfated variants three orders of magnitude more potent than the unmodified inhibitors. The three-dimensional structure of madanin-1 in complex with thrombin revealed a unique mode of inhibition, with the sulfated tyrosine residues binding to the basic exosite II of the protease. The importance of tyrosine sulfation within this family of thrombin inhibitors, together with their unique binding mode, paves the way for the development of anti-thrombotic drug leads based on these privileged scaffolds.

  3. Determination of boron spectrophotometry in thorium sulfate

    International Nuclear Information System (INIS)

    Federgrun, L.; Abrao, A.

    1976-01-01

    A procedure for the determination of microquantities of boron in nuclear grade thorium sulfate is described. The method is based on the extraction of BF - 4 ion associated to monomethylthionine (MMT) in 1,2 - dichloroethane. The extraction of the colored BF - 4 -MMT complex does not allow the presence of sulfuric and phosphoric acids; other anions interfere seriously. This fact makes the dissolution of the thorium sulfate impracticable, since it is insoluble in both acids. On the other hand, the quantitative separation of thorium is mandatory, to avoid the precipitation of ThF 4 . To overcome this difficulty, the thorium sulfate is dissolved using a strong cationic ion exchanger, Th 4+ being totally retained into the resin. Boron is then analysed in the effluent. The procedure allows the determination of 0.2 to 10.0 microgramas of B, with a maximum error of 10%. Thorium sulfate samples with contents of 0.2 to 2.0μg B/gTh have being analysed [pt

  4. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  5. Sulfated oligosaccharide structures, as determined by NMR techniques

    International Nuclear Information System (INIS)

    Noseda, M.D.; Duarte, M.E.R.; Tischer, C.A.; Gorin, P.A.J.; Cerezo, A.S.

    1997-01-01

    Carrageenans are sulfated polysaccharides, produced by red seaweeds (Rhodophyta), that have important biological and physico-chemical properties. Using partial autohydrolysis, we obtained sulfated oligosaccharides from a λ-carrageenan (Noseda and Cerezo, 1993). These oligosaccharides are valuable not only for the study of the structures of the parent carrageenans but also for their possible biological activities. In this work we determined the chemical structure of one of the sulfated oligosaccharides using 1D and 2D NMR techniques. (author)

  6. Sources et marché du sulfate d'ammonium Sources of and Market for Ammonium Sulfate

    Directory of Open Access Journals (Sweden)

    Loussouarn C.

    2006-11-01

    Full Text Available Engrais azoté le plus utilisé dans le monde jusqu'en 1970, le sulfate d'ammonium ne représente plus aujourd'hui que 4 % de la fertilisation azotée. Avec une teneur en azote de 21 % seulement, il a été peu à peu remplacé comme engrais universel par des produits plus concentrés, notamment l'urée et le nitrate d'ammonium. Obtenu pour plus de 40 % comme sous-produit dans la synthèse de monomères comme le caprolactame, l'acrylonitrile ou le méthacrylate de méthyle, et pour près de 10 % dans le traitement des gaz de cokerie, sa production dépend largement des développements du marché des fibres synthétiques, et, dans une moindre mesure, de la sidérurgie et de la métallurgie. Dans les pays développés, où la production est essentiellement fatale, le volume du marché est et sera plus fonction de la disponibilité du sulfate d'ammonium que de la demande ou de facteurs de marché; sa consommation ne résidera plus que dans des applications spécifiques pour lesquelles il sera bien adapté. Par contre, l'intérêt croissant pour compenser le déficit en soufre de certains sols, et les qualités agronomiques propres du sulfate d'ammonium laissent entrevoir la possibilité d'un essor de son utilisation dans certaines régions en voie de développernent. Ammonium sulfate was the most worldwide nitrogenous fertilizer used up to 1970. Today, it makes up only 4% of nitrogenous fertilization. With a nitrogen content of only 21%, it has gradually been replaced as a universal fertilizer by more concentrated products, particularly urea and ammonium nitrate. More than 40% of the ammonium sulfate is obtained as a by-product from the synthesis of monomers such as caprolactam, acrylonitrile or methyl methacrylate, and nearly 10% from coking gas processing. Its production depends extensively on the development of the market for synthetic fibers and, to a lesser extent, on the steel and metallurgical industries. In the industrialized countries

  7. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  8. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  9. Tyrosine Sulfation as a Protein Post-Translational Modification

    Directory of Open Access Journals (Sweden)

    Yuh-Shyong Yang

    2015-01-01

    Full Text Available Integration of inorganic sulfate into biological molecules plays an important role in biological systems and is directly involved in the instigation of diseases. Protein tyrosine sulfation (PTS is a common post-translational modification that was first reported in the literature fifty years ago. However, the significance of PTS under physiological conditions and its link to diseases have just begun to be appreciated in recent years. PTS is catalyzed by tyrosylprotein sulfotransferase (TPST through transfer of an activated sulfate from 3'-phosphoadenosine-5'-phosphosulfate to tyrosine in a variety of proteins and peptides. Currently, only a small fraction of sulfated proteins is known and the understanding of the biological sulfation mechanisms is still in progress. In this review, we give an introductory and selective brief review of PTS and then summarize the basic biochemical information including the activity and the preparation of TPST, methods for the determination of PTS, and kinetics and reaction mechanism of TPST. This information is fundamental for the further exploration of the function of PTS that induces protein-protein interactions and the subsequent biochemical and physiological reactions.

  10. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  11. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  12. Acidity enhancement of niobia by sulfation: An experimental and DFT study

    Energy Technology Data Exchange (ETDEWEB)

    Rocha, Angela S., E-mail: angela.sanches.rocha@gmail.com [Universidade do Estado do Rio de Janeiro, Departamento de Físico-Química, Instituto de Química, Rio de Janeiro (Brazil); Costa, Gustavo C. [Universidade do Estado do Rio de Janeiro, Departamento de Físico-Química, Instituto de Química, Rio de Janeiro (Brazil); Tamiasso-Martinhon, Priscila; Sousa, Célia; Rocha, Alexandre B. [Universidade Federal do Rio de Janeiro, Departamento de Físico-Química, Instituto de Química, Rio de Janeiro (Brazil)

    2017-01-15

    Acidic solids are used as catalyst at several industrial processes and studies to improve their activities have been developed by different groups. One method well known is sulfating oxide to create new acid sites, but investigations about sulfated niobia are still scarce. This work studied the influence of sulfation on the niobia acidity by using a very simple reaction model, the esterification of acetic acid with ethanol, performed at 60 °C and 1 atm. Niobia and sulfated niobia samples were characterized by N{sub 2} adsorption, X-ray diffraction, FTIR and titration with n-butylamine. To investigate the nature of sulfate groups formed on the surface of niobia, calculations based on the Density Functional Theory (DFT) have been performed for two models: pure niobia with hydroxylated surface and sulfated niobia where one OH{sup −} surface group was replaced by a HSO{sub 4}{sup −}. The experimental results indicated that the sulfation treatment leads to an increase in the specific surface area, acidity and, consequently, in the activity of niobia, with small changes in the crystal structure of the solid. The presence of sulfate groups was evidenced by FTIR spectra and calculations have indicated HSO{sub 4}{sup −} species bounded to the surface. Density Functional Perturbation Theory (DFPT) was also employed to obtain infrared intensities in the region of sulfate vibration bands. - Highlights: • Sulfation treatment has improved the acidity of niobium oxide. • A sulfate group on niobia (T-Nb{sub 2}O{sub 5}) was proposed using DFT method. • Niobia and sulfated niobia are used for esterification of acetic acid with ethanol.

  13. X-ray diffraction study of lithium hydrazinium sulfate and lithium ammonium sulfate crystals under a static electric field

    International Nuclear Information System (INIS)

    Sebastian, M.T.; Becker, R.A.; Klapper, H.

    1991-01-01

    X-ray diffraction studies are made on proton-conducting polar lithium hydrazinium sulfate and ferroelectric lithium ammonium sulfate. The X-ray rocking curves recorded with in situ electric field along the polar b axis of lithium hydrazinium sulfate (direction of proton conductivity) show a strong enhancement of the 0k0 diffraction intensity. The corresponding 0k0 X-ray topographs reveal extinction contrast consisting of striations parallel to the polar axis. They disappear when the electric field is switched off. The effect is very strong in 0k0 but invisible in h0l reflections. It is present only if the electric field is parallel to the polar axis b. This unusual X-ray topographic contrast is correlated with the proton conduction. It is supposed that, under electric field, an inhomogeneous charge distribution develops, distorting the crystal lattice. Similar experiments on lithium ammonium sulfate also show contrast variations, but of quite different behaviour than before. In this case they result from changes of the ferroelectric domain configuration under electric field. (orig.)

  14. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  15. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  16. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  17. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  18. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  19. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  20. Sulfate Reduction Remediation of a Metals Plume Through Organic Injection

    International Nuclear Information System (INIS)

    Phifer, M.A.

    2003-01-01

    Laboratory testing and a field-scale demonstration for the sulfate reduction remediation of an acidic/metals/sulfate groundwater plume at the Savannah River Site has been conducted. The laboratory testing consisted of the use of anaerobic microcosms to test the viability of three organic substrates to promote microbially mediated sulfate reduction. Based upon the laboratory testing, soybean oil and sodium lactate were selected for injection during the subsequent field-scale demonstration. The field-scale demonstration is currently ongoing. Approximately 825 gallons (3,123 L) of soybean oil and 225 gallons (852 L) of 60 percent sodium lactate have been injected into an existing well system within the plume. Since the injections, sulfate concentrations in the injection zone have significantly decreased, sulfate-reducing bacteria concentrations have significantly increased, the pH has increased, the Eh has decreased, and the concentrations of many metals have decreased. Microbially mediated sulfate reduction has been successfully promoted for the remediation of the acidic/metals/sulfate plume by the injection of soybean oil and sodium lactate within the plume

  1. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  2. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  3. Using Sulfate-Amended Sediment Slurry Batch Reactors to Evaluate Mercury Methylation

    International Nuclear Information System (INIS)

    Harmon, S.M.

    2003-01-01

    In the methylated form, mercury represents a concern to public health primarily through the consumption of contaminated fish tissue. Research conducted on the methylation of mercury strongly suggests the process is microbial in nature and facilitated principally by sulfate-reducing bacteria. This study addressed the potential for mercury methylation by varying sulfate treatments and wetland-based soil in microbial slurry reactors with available inorganic mercury. Under anoxic laboratory conditions conducive to growth of naturally occurring sulfate-reducing bacteria in the soil, it was possible to evaluate how various sulfate additions influenced the methylation of inorganic mercury added to overlying water. Treatments included sulfate amendments ranging FR-om 25 to 500 mg/L (0.26 to 5.2 mM) above the soil's natural sulfate level. This study also provided an assessment of mercury methylation relative to sulfate-reducing bacterial population growth and subsequent sulfide production. Mercury methylation in sulfate treatments did not exceed that of the non-amended control during a 35-day incubation. However, increases in methylmercury concentration were linked to bacterial growth and sulfate reduction. A time lag in methylation in the highest treatment correlated with an equivalent lag in bacterial growth

  4. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  5. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  6. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  7. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  8. A zinc complex of heparan sulfate destabilises lysozyme and alters its conformation

    International Nuclear Information System (INIS)

    Hughes, Ashley J.; Hussain, Rohanah; Cosentino, Cesare; Guerrini, Marco; Siligardi, Giuliano; Yates, Edwin A.; Rudd, Timothy R.

    2012-01-01

    Highlights: ► Zinc–heparan sulfate complex destabilises lysozyme, a model amyloid protein. ► Addition of zinc, without heparan sulfate, stabilises lysozyme. ► Heparan sulfate cation complexes provide alternative protein folding routes. -- Abstract: The naturally occurring anionic cell surface polysaccharide heparan sulfate is involved in key biological activities and is implicated in amyloid formation. Following addition of Zn–heparan sulfate, hen lysozyme, a model amyloid forming protein, resembled β-rich amyloid by far UV circular dichroism (increased β-sheet: +25%), with a significantly reduced melting temperature (from 68 to 58 °C) by fluorescence shift assay. Secondary structure stability of the Zn–heparan sulfate complex with lysozyme was also distinct from that with heparan sulfate, under stronger denaturation conditions using synchrotron radiation circular dichroism. Changing the cation associated with heparan sulfate is sufficient to alter the conformation and stability of complexes formed between heparan sulfate and lysozyme, substantially reducing the stability of the protein. Complexes of heparan sulfate and cations, such as Zn, which are abundant in the brain, may provide alternative folding routes for proteins.

  9. Anti-parallel polarization switching in a triglycine sulfate organic ferroelectric insulator: The role of surface charges

    Science.gov (United States)

    Ma, He; Wu, Zhuangchun; Peng, Dongwen; Wang, Yaojin; Wang, Yiping; Yang, Ying; Yuan, Guoliang

    2018-04-01

    Four consecutive ferroelectric polarization switchings and an abnormal ring-like domain pattern can be introduced by a single tip bias of a piezoresponse force microscope in the (010) triglycine sulfate (TGS) crystal. The external electric field anti-parallel to the original polarization induces the first polarization switching; however, the surface charges of TGS can move toward the tip location and induce the second polarization switching once the tip bias is removed. The two switchings allow a ring-like pattern composed of the central domain with downward polarization and the outer domain with upward polarization. Once the two domains disappear gradually as a result of depolarization, the other two polarization switchings occur one by one at the TGS where the tip contacts. However, the backswitching phenomenon does not occur when the external electric field is parallel to the original polarization. These results can be explained according to the surface charges instead of the charges injected inside.

  10. Dermatan Sulfate Epimerase 1-Deficient Mice Have Reduced Content and Changed Distribution of Iduronic Acids in Dermatan Sulfate and an Altered Collagen Structure in Skin

    DEFF Research Database (Denmark)

    Maccarana, M.; Kalamajski, S.; Kongsgaard, M.

    2009-01-01

    Dermatan sulfate epimerase 1 (DS-epi1) and DS-epi2 convert glucuronic acid to iduronic acid in chondroitin/dermatan sulfate biosynthesis. Here we report on the generation of DS-epi1-null mice and the resulting alterations in the chondroitin/dermatan polysaccharide chains. The numbers of long blocks...... of adjacent iduronic acids are greatly decreased in skin decorin and biglycan chondroitin/dermatan sulfate, along with a parallel decrease in iduronic-2-O-sulfated-galactosamine-4-O-sulfated structures. Both iduronic acid blocks and iduronic acids surrounded by glucuronic acids are also decreased in versican......-derived chains. DS-epi1-deficient mice are smaller than their wild-type littermates but otherwise have no gross macroscopic alterations. The lack of DS-epi1 affects the chondroitin/dermatan sulfate in many proteoglycans, and the consequences for skin collagen structure were initially analyzed. We found...

  11. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  12. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  13. Recoverable immobilization of transuranic elements in sulfate ash

    Science.gov (United States)

    Greenhalgh, Wilbur O.

    1985-01-01

    Disclosed is a method of reversibly immobilizing sulfate ash at least about 20% of which is sulfates of transuranic elements. The ash is mixed with a metal which can be aluminum, cerium, samarium, europium, or a mixture thereof, in amounts sufficient to form an alloy with the transuranic elements, plus an additional amount to reduce the transuranic element sulfates to elemental form. Also added to the ash is a fluxing agent in an amount sufficient to lower the percentage of the transuranic element sulfates to about 1% to about 10%. The mixture of the ash, metal, and fluxing agent is heated to a temperature sufficient to melt the fluxing agent and the metal. The mixture is then cooled and the alloy is separated from the remainder of the mixture.

  14. Chondroitin sulfate effects on neural stem cell differentiation.

    Science.gov (United States)

    Canning, David R; Brelsford, Natalie R; Lovett, Neil W

    2016-01-01

    We have investigated the role chondroitin sulfate has on cell interactions during neural plate formation in the early chick embryo. Using tissue culture isolates from the prospective neural plate, we have measured neural gene expression profiles associated with neural stem cell differentiation. Removal of chondroitin sulfate from stage 4 neural plate tissue leads to altered associations of N-cadherin-positive neural progenitors and causes changes in the normal sequence of neural marker gene expression. Absence of chondroitin sulfate in the neural plate leads to reduced Sox2 expression and is accompanied by an increase in the expression of anterior markers of neural regionalization. Results obtained in this study suggest that the presence of chondroitin sulfate in the anterior chick embryo is instrumental in maintaining cells in the neural precursor state.

  15. Chondroitin sulfate synthase-2 is necessary for chain extension of chondroitin sulfate but not critical for skeletal development.

    Science.gov (United States)

    Ogawa, Hiroyasu; Hatano, Sonoko; Sugiura, Nobuo; Nagai, Naoko; Sato, Takashi; Shimizu, Katsuji; Kimata, Koji; Narimatsu, Hisashi; Watanabe, Hideto

    2012-01-01

    Chondroitin sulfate (CS) is a linear polysaccharide consisting of repeating disaccharide units of N-acetyl-D-galactosamine and D-glucuronic acid residues, modified with sulfated residues at various positions. Based on its structural diversity in chain length and sulfation patterns, CS provides specific biological functions in cell adhesion, morphogenesis, neural network formation, and cell division. To date, six glycosyltransferases are known to be involved in the biosynthesis of chondroitin saccharide chains, and a hetero-oligomer complex of chondroitin sulfate synthase-1 (CSS1)/chondroitin synthase-1 and chondroitin sulfate synthase-2 (CSS2)/chondroitin polymerizing factor is known to have the strongest polymerizing activity. Here, we generated and analyzed CSS2(-/-) mice. Although they were viable and fertile, exhibiting no overt morphological abnormalities or osteoarthritis, their cartilage contained CS chains with a shorter length and at a similar number to wild type. Further analysis using CSS2(-/-) chondrocyte culture systems, together with siRNA of CSS1, revealed the presence of two CS chain species in length, suggesting two steps of CS chain polymerization; i.e., elongation from the linkage region up to Mr ∼10,000, and further extension. There, CSS2 mainly participated in the extension, whereas CSS1 participated in both the extension and the initiation. Our study demonstrates the distinct function of CSS1 and CSS2, providing a clue in the elucidation of the mechanism of CS biosynthesis.

  16. Improvement of the degradation of sulfate rich wastewater using sweetmeat waste (SMW) as nutrient supplement

    Energy Technology Data Exchange (ETDEWEB)

    Das, Bidus Kanti [Department of Mining Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India); Roy, Shantonu [Department of Biotechnology, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India); Dev, Subhabrata [Department of Mining Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India); Das, Debabrata [Department of Biotechnology, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India); Bhattacharya, Jayanta, E-mail: jayantaism@gmail.com [Department of Mining Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India); School of Environmental Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, 721302 (India)

    2015-12-30

    Highlights: • Sweetmeat waste (SMW) as a nutrient supplement in the SO{sub 4}{sup 2−} reduction system. • COD/SO{sub 4}{sup 2−} ratio of 4 was found suitable for SO{sub 4}{sup 2−} removal. • Sulfate reducing and acidogenic bacteria were dominant microbes in the system. • Microbial diversities were almost remained unaltered at different COD/SO{sub 4}{sup 2−} ratios. - Abstract: External dosing of sweetmeat waste (SMW) dosing into exhausted upflow packed bed bioreactor (PBR) resulted in prompt reactivation of SO{sub 4}{sup 2−} removal. Different SMW concentrations in terms of chemical oxygen demand (COD)/SO{sub 4}{sup 2−} ratios (1, 2, 4 and 8) were introduced into four identical PBR where process stability was found within 3 weeks of operation. SO{sub 4}{sup 2−} removal was proportional to COD/SO{sub 4}{sup 2−} ratios up to 4 at which maximum sulfate removal (99%) was achieved at a rate of 607 mg/d. The value of COD {sub consumption}:SO{sub 4}{sup 2−}{sub removal} was much higher at ratio 4 than 8 whereas, ratio 2 was preferred over all. Net effluent acetate concentration profile and total microbial population attached to the reactor matrices were corresponding to COD/SO{sub 4}{sup 2−} ratio as 4 > 8 > 2 >> 1. Sulfate reducing bacteria (SRB) population was found to be inversely proportional to COD/SO{sub 4}{sup 2−} ratio in which acetate oxidizing SRB and fermentative bacteria were the dominant.

  17. Modeling the use of sulfate additives for potassium chloride destruction in biomass combustion

    DEFF Research Database (Denmark)

    Wu, Hao; Grell, Morten Nedergaard; Jespersen, Jacob Boll

    2013-01-01

    Potassium chloride, KCl, formed from biomass combustion may lead to ash deposition and corrosion problems in boilers. Sulfates are effective additives for converting KCl to the less harmful K2SO4. In the present study, the decomposition of ammonium sulfate, aluminum sulfate and ferric sulfate...... of ammonium sulfate addition and ferric sulfation addition compared favorably with the experimental results. However, the model for aluminum sulfate addition under-predicted significantly the high sulfation degree of KCl observed in the experiments, possibly because of an under-estimation of the decomposition...... rate of aluminum. Under the boiler conditions of the present work, the simulation results suggested that the desirable temperature for the ferric sulfate injection was around 950-900oC, whereas for ammonium sulfate the preferable injection temperature was below 800oC....

  18. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Synthesis of [2,4-3H] 17β-dihydroequilin sulfate

    International Nuclear Information System (INIS)

    Bhavnani, B.R.

    1994-01-01

    [2,4- 3 H] 17β-dihydroequilin-3-sulfate ammonium salt suitable for in vivo pharmacokinetic studies was synthesized from [2,4- 3 H] equilin. Sulfation of [2,4- 3 H] equilin with pyridine-chlorosulfonic acid mixture gave in high yields [2,4- 3 H] equilin sulfate, which was then reduced with sodium borohydride to yield [2,4- 3 H] 17β-dihydroequilin sulfate. The reduction was sterospecific and no 17α-reduced products were formed. (author)

  20. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  1. Identification of concrete deteriorating minerals by polarizing and scanning electron microscopy

    International Nuclear Information System (INIS)

    Gregerova, Miroslava; Vsiansky, Dalibor

    2009-01-01

    The deterioration of concrete represents one of the most serious problems of civil engineering worldwide. Besides other processes, deterioration of concrete consists of sulfate attack and carbonation. Sulfate attack results in the formation of gypsum, ettringite and thaumasite in hardened concrete. Products of sulfate attack may cause a loss of material strength and a risk of collapse of the concrete constructions. The authors focused especially on the microscopical research of sulfate attack. Concrete samples were taken from the Charles Bridge in Prague, Czech Republic. A succession of degrading mineral formation was suggested. Microscope methods represent a new approach to solving the deterioration problems. They enable evaluation of the state of concrete constructions and in cooperation with hydro-geochemistry, mathematics and statistics permit prediction of the durability of a structure. Considering the number of concrete constructions and their age, research of concrete deterioration has an increasing importance. The results obtained can also be useful for future construction, because they identify the risk factors associated with formation of minerals known to degrade structures.

  2. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  3. Biological sulfate removal from gypsum contaminated construction and demolition debris.

    Science.gov (United States)

    Kijjanapanich, Pimluck; Annachhatre, Ajit P; Esposito, Giovanni; van Hullebusch, Eric D; Lens, Piet N L

    2013-12-15

    Construction and demolition debris (CDD) contains high levels of sulfate that can cause detrimental environmental impacts when disposed without adequate treatment. In landfills, sulfate can be converted to hydrogen sulfide under anaerobic conditions. CDD can thus cause health impacts or odor problems to landfill employees and surrounding residents. Reduction of the sulfate content of CDD is an option to overcome these problems. This study aimed at developing a biological sulfate removal system to reduce the sulfate content of gypsum contaminated CDD in order to decrease the amount of solid waste, to improve the quality of CDD waste for recycling purposes and to recover sulfur from CDD. The treatment leached out the gypsum contained in CDD by water in a leaching column. The sulfate loaded leachate was then treated in a biological sulfate reducing Upflow Anaerobic Sludge Blanket (UASB) reactor to convert the sulfate to sulfide. The UASB reactor was operated at 23 ± 3 °C with a hydraulic retention time and upflow velocity of 15.5 h and 0.1 m h(-1), respectively while ethanol was added as electron donor at a final organic loading rate of 3.46 g COD L(-1) reactor d(-1). The CDD leachate had a pH of 8-9 and sulfate dissolution rates of 526.4 and 609.8 mg L(-1) d(-1) were achieved in CDD gypsum and CDD sand, respectively. Besides, it was observed that the gypsum dissolution was the rate limiting step for the biological treatment of CDD. The sulfate removal efficiency of the system stabilized at around 85%, enabling the reuse of the UASB effluent for the leaching step, proving the versatility of the bioreactor for practical applications. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  5. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  6. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  7. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  8. Sulfate Aerosol in the Arctic: Source Attribution and Radiative Forcing

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Yang [Atmospheric Science and Global Change Division, Pacific Northwest National Laboratory, Richland WA USA; Wang, Hailong [Atmospheric Science and Global Change Division, Pacific Northwest National Laboratory, Richland WA USA; Smith, Steven J. [Joint Global Change Research Institute, Pacific Northwest National Laboratory, College Park MD USA; Easter, Richard C. [Atmospheric Science and Global Change Division, Pacific Northwest National Laboratory, Richland WA USA; Rasch, Philip J. [Atmospheric Science and Global Change Division, Pacific Northwest National Laboratory, Richland WA USA

    2018-02-08

    Source attributions of Arctic sulfate and its direct radiative effect for 2010–2014 are quantified in this study using the Community Earth System Model (CESM) equipped with an explicit sulfur source-tagging technique. Regions that have high emissions and/or are near/within the Arctic present relatively large contributions to Arctic sulfate burden, with the largest contribution from sources in East Asia (27%). East Asia and South Asia together have the largest contributions to Arctic sulfate concentrations at 9–12 km, whereas sources within or near the Arctic account largely below 2 km. For remote sources with strong emissions, their contributions to Arctic sulfate burden are primarily driven by meteorology, while contributions of sources within or near the Arctic are dominated by their emission strength. The sulfate direct radiative effect (DRE) is –0.080 W m-2 at the Arctic surface, offsetting the net warming effect from the combination of in-snow heating and DRE cooling from black carbon. East Asia, Arctic local and Russia/Belarus/Ukraine sources contribute –0.017, –0.016 and –0.014 W m-2, respectively, to Arctic sulfate DRE. A 20% reduction in anthropogenic SO2 emissions leads to a net increase of +0.013 W m-2 forcing at the Arctic surface. These results indicate that a joint reduction in BC emissions could prevent possible Arctic warming from future reductions in SO2 emissions. Sulfate DRE efficiency calculations suggest that short transport pathways together with meteorology favoring long sulfate lifetimes make certain sources more efficient in influencing the Arctic sulfate DRE.

  9. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  10. Human platelet as an independent unit for sulfate conjugation

    International Nuclear Information System (INIS)

    Khoo, B.Y.; Sit, K.H.; Wong, K.P.

    1988-01-01

    The human platelets possess a full complement of enzymes capable of synthesizing N-acetyldopamine (NADA) 35 sulfate from ATP, Mg ++ and sodium 35 sulfate. The pH optimum for this three-step overall sulfate conjugation (comprising of the ATP sulfurylase, APS kinase and phenolsulfotransferase reactions) is 8.6 and the reactions proceeded progressively for several hours. Both ATP and Mg ++ ions, above their respective optimal concentrations of 5 and 7 mM, inhibited the sulfate conjugation of NADA. The apparent Km values for NADA as determined by the phenolsulfotransferase (PST) and overall reactions were similar in magnitude being 2.6 and 4.8 μM, respectively, while that for sodium 35 sulfate was 202 μM. A comparison of these two activities in 62 platelet preparations of normal subjects showed that the rate of the PST reaction was generally higher than the overall reaction even though the PST assay was carried out at suboptimal concentration of PAPS. There was a positive correlation (r=0.82) between the two sets of data, suggesting that the PST reaction probably has some control over the rate of overall sulfate conjugation

  11. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  13. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  14. Sulfated oligosaccharide structures, as determined by NMR techniques

    Energy Technology Data Exchange (ETDEWEB)

    Noseda, M.D.; Duarte, M.E.R.; Tischer, C.A.; Gorin, P.A.J. [Parana Univ., Curitiba, PR (Brazil). Dept. De Bioquimica; Cerezo, A.S. [Buenos Aires Univ. Nacional (Argentina). Dept. de Quimica Organica

    1997-12-31

    Carrageenans are sulfated polysaccharides, produced by red seaweeds (Rhodophyta), that have important biological and physico-chemical properties. Using partial autohydrolysis, we obtained sulfated oligosaccharides from a {lambda}-carrageenan (Noseda and Cerezo, 1993). These oligosaccharides are valuable not only for the study of the structures of the parent carrageenans but also for their possible biological activities. In this work we determined the chemical structure of one of the sulfated oligosaccharides using 1D and 2D NMR techniques. (author) 4 refs., 8 figs., 1 tabs.

  15. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  16. Potential for beneficial application of sulfate reducing bacteria in sulfate containing domestic wastewater treatment.

    Science.gov (United States)

    van den Brand, T P H; Roest, K; Chen, G H; Brdjanovic, D; van Loosdrecht, M C M

    2015-11-01

    The activity of sulfate reducing bacteria (SRB) in domestic wastewater treatment plants (WWTP) is often considered as a problem due to H2S formation and potential related odour and corrosion of materials. However, when controlled well, these bacteria can be effectively used in a positive manner for the treatment of wastewater. The main advantages of using SRB in wastewater treatment are: (1) minimal sludge production, (2) reduction of potential pathogens presence, (3) removal of heavy metals and (4) as pre-treatment of anaerobic digestion. These advantages are accessory to efficient and stable COD removal by SRB. Though only a few studies have been conducted on SRB treatment of domestic wastewater, the many studies performed on industrial wastewater provide information on the potential of SRB in domestic wastewater treatment. A key-parameter analyses literature study comprising pH, organic substrates, sulfate, salt, temperature and oxygen revealed that the conditions are well suited for the application of SRB in domestic wastewater treatment. Since the application of SRB in WWTP has environmental benefits its application is worth considering for wastewater treatment, when sulfate is present in the influent.

  17. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  18. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  19. Cell-associated proteoheparan sulfate from bovine arterial smooth muscle cells

    International Nuclear Information System (INIS)

    Schmidt, A.; Buddecke, E.

    1988-01-01

    Cell-associated proteoheparan sulfate has been isolated from bovine arterial smooth muscle cells preincubated with [ 35 S]sulfate or a combination of [ 3 H]glucosamine and [ 35 S]methionine. The purified proteoheparan sulfate had an apparent M r of 200,000 on calibrated Sepharose CL-2B columns. The glycosaminoglycan component (M r ∼30,000) was identified as heparan sulfate by its susceptibility to specific enzymatic and chemical degradation. After degradation of the proteoheparan sulfate by microbial heparitinase the resulting protein core had an apparent M r of 92,000 on SDS-polyacrylamide gels. Its mobility was similar in the absence and presence of reducing agents indicating that the protein core consists of a single polypeptide chain. Pulse-chase experiments revealed that about 40% of the cell layer-associated proteoheparan sulfate was released into the medium, while the remainder was internalized and converted to smaller species through a series of degradation steps. Initially there was a proteolytical cleavage of the protein core generating glycosaminoglycan peptide intermediates with polysaccharides chains similar in size to the original. The half-life of the native proteoheparan sulfate was found to be about 4 h

  20. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  1. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  2. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  3. Rectal necrosis following external radiation therapy for carcinoma of the prostate: report of a case

    International Nuclear Information System (INIS)

    Quan, S.H.Q.; O'Kelly, P.J.

    1975-01-01

    Increasing attention is being paid to the use of radiation therapy in the management of primary carcinoma of the prostate. Since 1965, radical radiation therapy has been used at Memorial Hospital to treat primary carcinoma of the prostate. Small primary tumors are treated by implantation with radioactive iodine ( 125 I) seeds and larger tumors considered unsuitable for implantation are treated by external supervoltage beam therapy. Fifty patients had been treated by implantation and 30 by external beam therapy at the time of this report. None of the patients treated by implantation developed rectal symptoms. Proctitis developed in all patients treated by external radiation therapy and in half the patients chronic proctitis ensued, accompanied by the passage of mucus. The constant leaking of mucus through the anal sphincter produces irritation of the skin and intermittent attacks of pruritus ani, a discomfiting sequel. Apart from the proctitis, most patients tolerated treatment well, with one notable exception, in whom rectal necrosis developed. This case is described

  4. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  5. Desulfonatronovibrio halophilus sp. nov., a novel moderately halophilic sulfate-reducing bacterium from hypersaline chloride-sulfate lakes in Central Asia

    NARCIS (Netherlands)

    Sorokin, D.Y.; Tourova, T.P.; Abbas, B.; Suhacheva, M.V.; Muyzer, G.

    2012-01-01

    Four strains of lithotrophic sulfate-reducing bacteria (SRB) have been enriched and isolated from anoxic sediments of hypersaline chloride-sulfate lakes in the Kulunda Steppe (Altai, Russia) at 2 M NaCl and pH 7.5. According to the 16S rRNA gene sequence analysis, the isolates were closely related

  6. Desulfonatronovibrio halophilus sp. nov., a novel moderately halophilic sulfate-reducing bacterium from hypersaline chloride–sulfate lakes in Central Asia

    NARCIS (Netherlands)

    Sorokin, D.Y.; Tourova, T.P.; Abbas, B.; Suhacheva, M.V.; Muyzer, G.

    2012-01-01

    Four strains of lithotrophic sulfate-reducing bacteria (SRB) have been enriched and isolated from anoxic sediments of hypersaline chloride–sulfate lakes in the Kulunda Steppe (Altai, Russia) at 2 M NaCl and pH 7.5. According to the 16S rRNA gene sequence analysis, the isolates were closely related

  7. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  8. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  9. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  10. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  11. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  12. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  13. Micro-SHINE Uranyl Sulfate Irradiations at the Linac

    Energy Technology Data Exchange (ETDEWEB)

    Youker, Amanda J. [Argonne National Lab. (ANL), Argonne, IL (United States); Kalensky, Michael [Argonne National Lab. (ANL), Argonne, IL (United States); Chemerisov, Sergey [Argonne National Lab. (ANL), Argonne, IL (United States); Schneider, John [Argonne National Lab. (ANL), Argonne, IL (United States); Byrnes, James [Argonne National Lab. (ANL), Argonne, IL (United States); Vandegrift, George F. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-08-01

    Peroxide formation due to water radiolysis in a uranyl sulfate solution is a concern for the SHINE Medical Technologies process in which Mo-99 is generated from the fission of dissolved low enriched uranium. To investigate the effects of power density and fission on peroxide formation and uranyl-peroxide precipitation, uranyl sulfate solutions were irradiated using a 50-MeV electron linac as part of the micro-SHINE experimental setup. Results are given for uranyl sulfate solutions with both high and low enriched uranium irradiated at different linac powers.

  14. Modeling the Use of Sulfate Additives for Potassium Chloride Destruction in Biomass Combustion

    DEFF Research Database (Denmark)

    Wu, Hao; Pedersen, Morten Nedergaard; Jespersen, Jacob Boll

    2014-01-01

    Potassium chloride, KCl, formed from biomass combustion may lead to ash deposition and corrosion problems in boilers. Sulfates are effective additives for converting KCl to the less harmful K2SO4 and HCl. In the present study, the rate constants for decomposition of ammonium sulfate and aluminum...... sulfate were obtained from experiments in a fast heating rate thermogravimetric analyzer. The yields of SO2 and SO3 from the decomposition were investigated in a tube reactor at 600–900 °C, revealing a constant distribution of about 15% SO2 and 85% SO3 from aluminum sulfate decomposition and a temperature...... fluidized-bed reactor using ammonium sulfate, aluminum sulfate, and ferric sulfate as additives. The simulation results for ammonium sulfate and ferric sulfate addition compared favorably to the experiments. The predictions for aluminum sulfate addition were only partly in agreement with the experimental...

  15. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  16. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  17. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  18. Opiate-like excitatory effects of steroid sulfates and calcium-complexing agents given cerebroventricularly.

    Science.gov (United States)

    LaBella, F S; Havlicek, V; Pinsky, C

    1979-01-12

    Intracerebroventricular administration of 10--20 microgram of steroid-O-sulfates induced hypermotility, agitation, salivation, EEG abnormalities, stereotypies, wet dog shakes and seizures. Equivalent effects resulted from 30--200 microgram morphine sulfate (H2SO4 salt), 50 microgram EGTA or 300--400 microgram of sodium sulfate or phosphate, but not chloride, nitrate or acetate. Non-steroid sulfates, steroid glucuronides and steroid phosphates were inactive. Naloxone, previously found to antagonize the excitatory effects of androsterone sulfate, failed to antagonize those of cortisol sulfate, sodium sulfate or EGTA. These findings suggest a role for extracellular calcium ions and for sulfate derived from circulating steroids in central responses to opiates.

  19. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  20. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.