WorldWideScience

Sample records for external sulfate attack

  1. Effect of metakaolin on external sulfate attack

    Energy Technology Data Exchange (ETDEWEB)

    Ramlochan, T.; Thomas, M. [Toronto Univ., Dept. of Civil Engineering, ON (Canada)

    2000-07-01

    The effect of high reactivity metakaolin (HRM) on the sulfate resistance of mortars was studied. Mortar bars with three cements of varying C{sub 3}A content were used for the experiment. After a six month exposure to a 5 per cent solution of sodium sulfate, mortar bars incorporating any level of HRM as a partial replacement for a high-C{sub 3}A was considered 'moderately sulfate resistant'; mortar bars with HRM and a moderate or low C{sub 3}A content as 'high sulfate resistant'. It was also determined that for long term sulfate resistance 15 per cent HRM or more may be required, depending on the C{sub 3}A content. The performance of HRM was found to be significantly influenced by the water-cementitious material ratio, and in turn, by permeability, suggesting that HRM might increase sulfate resistance more by lowering the permeability of the concrete than by any chemical action. 7 refs., 4 tabs., 7 figs.

  2. External sulfate attack in dam concretes with thaumasite formation

    Directory of Open Access Journals (Sweden)

    Chinchón-Payá, S.

    2015-03-01

    Full Text Available Concrete core samples extracted from different areas of the Mequinenza Dam (Spain have been studied and expansive reactions affecting the structure were not found. However, expansive reactions in the concrete of certain parts located near the abutments of two galleries have been observed as a consequence of an external sulfate attack due to the sulfur compounds contained in the lignites that are present on the surrounding terrain. Secondary gypsum, ettringite, and thaumasite, as well as several sulfate efflorescence have been detected. The thaumasite formed in the degraded concrete is related to a Thaumasite Sulfate Attack (TSA. Scanning Electron Microscopy (SEM and Rietveld analyses of the TSA samples would show that thaumasite could have been formed thanks to ettringite acting as nuclei or by a direct precipitation from solutions within the pores of the cement matrix.Se han estudiado testigos de hormigón extraídos de diferentes zonas de la presa de Mequinenza (España descartando la existencia de una reacción expansiva que pudiera afectar a la estructura. Sin embargo, se han observado reacciones expansivas en el hormigón de ciertas zonas próximas a los estribos de dos galerías, como consecuencia de un ataque sulfático externo debido a los compuestos de azufre contenidos en los lignitos que están presentes en los terrenos circundantes. Se ha identificado un conjunto de productos relacionados con el ataque sulfático: yeso secundario, ettringita y thaumasita, además de sales sulfatadas solubles. Las zonas más degradadas del hormigón coinciden con una cristalización abundante de thaumasita (Thaumasite Sulfate Attack–TSA-. El estudio de las muestras de TSA, mediante microscopía electrónica de barrido (SEM y el método de Rietveld, indicaría que la thaumasita podría haberse formado a partir de la ettringita como medio de nucleación o por precipitación directa a partir de sus componentes en disolución dentro de los poros de la

  3. Experimental and numerical study on cement paste degradation under external sulfate attack

    NARCIS (Netherlands)

    Ma, X.; Copuroglu, O.; Schlangen, H.E.J.G.; Han, N; Xing, F; Saouma, V.; Bolander, J.; Landis, E.

    2016-01-01

    External sulfate attack is one of the situations that may cause gradual but severe damage in cementitious materials, which may lead to cracking, increased permeability and strength loss. In this paper, thin-walled hollow cement paste cylinders with a wall thickness of 2.5mm were made considering the

  4. Coupled mechanical and chemo-transport model for the simulation of cementitious materials subjected to external sulfate attack

    International Nuclear Information System (INIS)

    Bary, B.; Le Bescop, P.; Leterrier, N.; Deville, E.

    2012-01-01

    We propose in this study to develop a chemo-transport-mechanical model for the simulation of external sulfate attack in cementitious materials. This degradation mainly consists in the hydrate decalcification/dissolution due to leaching, and in the reaction between the sulfate ions migrating within the material and mono-sulfate initially present to precipitate into ettringite. It may generate macroscopic expansions leading to severe microcracking. The key point in this study is the use of the integration numerical platform ALLIANCES which couples a code solving the chemical equations, the diffusion of ionic species into the porosity and the mechanical problem. The crystallization pressures resulting from the interaction between growing mono-sulfate crystals and the surrounding C-S-H matrix are assumed to cause the observed macroscopic swelling. A macroscopic bulk strain tensor calculated from the volume of formed ettringite is introduced for directly reproducing these expansions. Explicit up-scaling techniques applied on a simplified representation of the materials allow estimating both mechanical and diffusive properties of the evolving microstructure. The calculated macroscopic free expansions are in quite good agreement with experimental data, provided a correct calibration of the parameter involved in the expression of the bulk strain tensor. However, it is asserted that the model would lead to very high stress levels in the structures in the particular case of restrained displacements at its boundaries

  5. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel; Guessasma, Sofiane

    2012-01-01

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young's modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  6. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel

    2012-12-27

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young\\'s modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  7. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  8. Damage modelling in concrete subject to sulfate attack

    Directory of Open Access Journals (Sweden)

    N. Cefis

    2014-07-01

    Full Text Available In this paper, we consider the mechanical effect of the sulfate attack on concrete. The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.

  9. Controlling sulfate attack in Mississippi Department of Transportation structures.

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with specif...

  10. Controlling sulfate attack in Mississippi Department of Transportation structures

    Science.gov (United States)

    2010-08-01

    At some construction sites in Mississippi, deterioration of concrete in contact with the surrounding soil could be related to the high sulfate content of the adjacent soils. Studies dating to 1966 have documented sulfate attack associated with sp...

  11. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  12. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  13. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  14. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  15. Physical and microstructural aspects of sulfate attack on ordinary and limestone blended Portland cements

    International Nuclear Information System (INIS)

    Schmidt, Thomas; Lothenbach, Barbara; Romer, Michael; Neuenschwander, Juerg; Scrivener, Karen

    2009-01-01

    The consequences of external sulfate attack were investigated by traditional test methods, i.e. length and mass change, as well as by a newly developed, surface sensitive ultrasonic method, using Leaky Rayleigh waves (1 MHz). The macroscopic changes are discussed and compared with thermodynamic calculations and microstructural findings (SEM/EDS). The results show that the main impact of limestone additions on resistance to sulfate degradation are physical - i.e. addition of a few percent in Portland cement reduces the porosity and increases the resistance of Portland cement systems to sulfate; but higher addition of 25% increase porosity and lower resistance to sulfate. The kinetics of degradation were dramatically affected by the solution concentration (4 or 44 g Na 2 SO 4 /l) and the higher concentration also resulted in the formation of gypsum, which did not occur at the low concentration. However the pattern of cracking was similar in both cases and it appears that gypsum precipitates opportunistically in pre-formed cracks so it is not considered as making a significant contribution to the degradation. At 8 deg. C limited formation of thaumasite occurred in the surface region of the samples made from cement with limestone additions. This thaumasite formation led to loss of cohesion of the paste and loss of material from the surface of the samples. However thaumasite formation was always preceded by expansion and cracking of the samples due to ettringite formation and given the very slow kinetics of thaumasite formation it was probably facilitated by the opening up of the structure due to ettringite induced cracking. The expansion of the samples showed a steady stage, followed by a rapidly accelerating stage, with destruction of the samples. The onset of the rapidly accelerating stage occurred when the thickness of the cracked surface layer reached about 1-1.5 mm-10-15% of the total specimen thickness (10 mm).

  16. Controlling Sulfate Attack in Mississippi Department of Transportation Structures

    Science.gov (United States)

    2010-08-01

    such as calcium aluminates and calcium hydroxide , can influence the degree of damage observed. In all cases, the deterioration observed appears to be...high levels of sulfate showed mineralogical evidence that calcium alumino-sulfate minerals such as ettringite were present in significant quantities...investigation, the Caltrans test was modified to adapt it to the available equipment. A description of the modified test procedure is given in Appendix B. A

  17. Influence of Internal Sulfate Attack on Some Properties of High Strength Concrete

    Directory of Open Access Journals (Sweden)

    Nada Mahdi Fawzi

    2015-08-01

    Full Text Available One of the most important problems that faces the concrete industry in Iraq is the deterioration due to internal sulfate attack , since it reduces the compressive strength and increases the expansion of concrete. Consequently, the concrete structure may be damage .The effects of total and total effective sulfate contents on high strength concrete (HSC have been studied in the present study. The research studied the effect of sulfate content in cement , sand and gravel , as well as comparing the total sulfate content with the total effective SO3 content. Materials used were divided into two groups of SO3 in cement ,three groups of SO3 in sand ,and two groups of SO3 in gravel. The results show that considering the total effective sulfate content is better than the total content of sulfates since the effect of sulfate in each constituent of concrete, depends on it's granular size .The smaller the particle size of the material the more effective is the sulfate in it. Therefore, it is recommended to follow the Iraqi specification for total effective sulfate content, because it gives more flexibility to the use of sand and gravel with higher sulfate content. The results of compressive strength at 90-days show that the effect of total effective SO3 content of ( 2.647% , 2.992% , 3.424% that correspond to total sulfate of ( 3.778%, 3.294%, 4.528% decrease the compressive strength by (7.53%, 11.44%, 14.59% respectively.

  18. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. P. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  19. Influence of recycled fine aggregates on the resistance of mortars to magnesium sulfate attack

    International Nuclear Information System (INIS)

    Lee, Seung-Tae

    2009-01-01

    The influence of recycled fine aggregates, which had been reclaimed from field-demolished concretes, on the resistance of mortar specimens to magnesium sulfate attack was investigated. Mortar specimens were prepared with recycled fine aggregates at different replacement levels (0%, 25%, 50%, 75% and 100% of natural fine aggregate by mass). The mortar specimens were exposed to 4.24% magnesium sulfate solution for about 1 year at ambient temperature, and regularly monitored for visual appearance, compressive strength loss and expansion. Additionally, in order to identify products of magnesium sulfate attack, mortar samples incorporating 0%, 25% and 100% replacement levels of the recycled fine aggregates were examined by X-ray diffraction (XRD) technique. Experimental results confirmed that the use of recycled fine aggregates up to a maximum 50% replacement level is effective under severe magnesium sulfate environment, irrespective of type of recycled fine aggregates. However, the worse performance was observed in mortar specimens incorporating 100% replacement level. It was found that the water absorption of recycled fine aggregates affected deterioration of mortar specimens, especially at a higher replacement level. XRD results indicated that the main cause of deterioration of the mortar specimens was primarily due to the formation of gypsum and thaumasite by magnesium sulfate attack. In addition, it appeared that the conversion of C-S-H into M-S-H by the attack probably influenced mechanical deterioration of mortar specimens with recycled fine aggregates.

  20. The thaumasite form of sulfate attack in concrete of Yongan Dam

    International Nuclear Information System (INIS)

    Hu Mingyu; Long Fumei; Tang Mingshu

    2006-01-01

    According to microanalytical investigations, it is shown that the concrete of Yongan Dam is deteriorated due to the thaumasite form of sulfate attack (TSA). Analysis results of scanning electron microscopy (SEM), Energy Disperse X-ray (EDX) and X-ray Diffraction (XRD) are supported by the analysis of the concrete composition and the geographical conditions of the dam

  1. Effects of the addition of micro silica on the durability of mortars exposed to the sodium sulfate attack

    International Nuclear Information System (INIS)

    Nasser, C.; Meriam, M.

    2012-01-01

    This article presents a detailed experimental study on the sulfate attack of mortars of self compacting concrete, and the effectiveness of employs micro silica and limestone fillers in the minimization of the damage resulting from such an attack. The test solution used to supply the sulfate ions and the cations was the sodium sulfate solution 4.5%. The solution saturated with lime was employed as the reference solution. The main variables investigated in the study were the type of cement and mineral addition. The expansion measured on p rims of mortar of (40x40x160) millimeters was employed to estimate their durability after exposure to the sodium sulfate solution attack during 91 days-Specimens of mortars were visually examined to assess the extent of deterioration due to the sulfate attack. The x-ray diffraction was used to evaluate the microstructural nature of the sulfate attack. The test results proved that the use of micro silica had a beneficial effect on the expansion due to the sodium sulfate attack. While mortars with limestone filler have undergoes degradation even with the use of cement resistant to sulfates. (authors).

  2. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    International Nuclear Information System (INIS)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Rinder, Thomas; Klammer, Dietmar; Leis, Albrecht; Tritthart, Josef; Dietzel, Martin

    2013-01-01

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L −1 of SO 4 and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L −1 of SO 4 and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as 2 H/H and 18 O/ 16 O isotope ratios of H 2 O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the

  3. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    Directory of Open Access Journals (Sweden)

    Atta-ur-Rehman

    2018-02-01

    Full Text Available In this study, the effects of titanium dioxide (TiO2 nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50 were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM, Energy Dispersive Spectroscopy (EDS, X-ray Diffraction (XRD, Thermogravimetry Analysis (TGA and Differential Scanning Calorimetry (DSC tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack.

  4. Experiment Analysis of Concrete’s Mechanical Property Deterioration Suffered Sulfate Attack and Drying-Wetting Cycles

    Directory of Open Access Journals (Sweden)

    Wei Tian

    2017-01-01

    Full Text Available The mechanism of concrete deterioration in sodium sulfate solution is investigated. The macroperformance was characterized via its apparent properties, mass loss, and compressive strength. Changes in ions in the solution at different sulfate attack periods were tested by inductively coupled plasma (ICP. The damage evolution law, as well as analysis of the concrete’s meso- and microstructure, was revealed by scanning electron microscope (SEM and computed tomography (CT scanning equipment. The results show that the characteristics of concrete differed at each sulfate attack period; the drying-wetting cycles generally accelerated the deterioration process of concrete. In the early sulfate attack period, the pore structure of the concrete was filled with sulfate attack products (e.g., ettringite and gypsum, and its mass and strength increased. The pore size and porosity decreased while the CT number increased. As deterioration progressed, the swelling/expansion force of products and the salt crystallization pressure of sulfate crystals acted on the inner wall of the concrete to accumulate damage and accelerate deterioration. The mass and strength of concrete sharply decreased. The number and volume of pores increased, and the pore grew more quickly resulting in initiation and expansion of microcracks while the CT number decreased.

  5. Testing Silica Fume-Based Concrete Composites under Chemical and Microbiological Sulfate Attacks

    Directory of Open Access Journals (Sweden)

    Adriana Estokova

    2016-04-01

    Full Text Available Current design practices based on descriptive approaches to concrete specification may not be appropriate for the management of aggressive environments. In this study, the durability of cement-based materials with and without the addition of silica fume, subjected to conditions that leach calcium and silicon, were investigated. Chemical corrosion was simulated by employing various H2SO4 and MgSO4 solutions, and biological corrosion was simulated using Acidithiobacillus sp. bacterial inoculation, leading to disrupted and damaged surfaces; the samples’ mass changes were studied following both chemical and biological attacks. Different leaching trends were observed via X-ray fluorescence when comparing chemical with biological leaching. Lower leaching rates were found for concrete samples fortified with silica fume than those without silica fume. X-ray diffraction and scanning electron microscopy confirmed a massive sulfate precipitate formation on the concrete surface due to bacterial exposure.

  6. Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481

    Energy Technology Data Exchange (ETDEWEB)

    Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S. [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States); Flach, G.; Langton, C.; Smith, F.G.III; Burns, H. [Savannah River National Laboratory, Aiken, SC 29808 (United States); Van der Sloot, H. [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands); Meeussen, J.C.L. [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands); Seignette, P.F.A.B. [Energy Research Center of The Netherlands, Petten (Netherlands); Samson, E. [SIMCO Technologies, Inc., Quebec (Canada); Mallick, P.; Suttora, L. [U.S. Department of Energy, Washington, DC (United States); Esh, D.; Fuhrmann, M.; Philip, J. [U.S. Nuclear Regulatory Commission, Washington, DC (United States)

    2013-07-01

    The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R}, were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R} models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation

  7. Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481

    International Nuclear Information System (INIS)

    Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S.; Flach, G.; Langton, C.; Smith, F.G.III; Burns, H.; Van der Sloot, H.; Meeussen, J.C.L.; Seignette, P.F.A.B.; Samson, E.; Mallick, P.; Suttora, L.; Esh, D.; Fuhrmann, M.; Philip, J.

    2013-01-01

    The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS TM /ORCHESTRA and STADIUM R , were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS TM /ORCHESTRA and STADIUM R models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation reactions with

  8. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    International Nuclear Information System (INIS)

    Langton, C.

    2008-01-01

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM(reg s ign) code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM(reg s ign) code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is

  9. Using Physical Context-Based Authentication against External Attacks: Models and Protocols

    Directory of Open Access Journals (Sweden)

    Wilson S. Melo

    2018-01-01

    Full Text Available Modern systems are increasingly dependent on the integration of physical processes and information technologies. This trend is remarkable in applications involving sensor networks, cyberphysical systems, and Internet of Things. Despite its complexity, such integration results in physical context information that can be used to improve security, especially authentication. In this paper, we show that entities sharing the same physical context can use it for establishing a secure communication channel and protecting each other against external attacks. We present such approach proposing a theoretical model for generating unique bitstreams. Two different protocols are suggested. Each one is evaluated using probabilistic analysis and simulation. In the end, we implement the authentication mechanism in a case study using networks radio signal as physical event generator. The results demonstrate the performance of each of the protocols and their suitability for applications in real world.

  10. Pattern of external injuries sustained during bomb blast attacks in Karachi, Pakistan from 2000 to 2007.

    Science.gov (United States)

    Surani, Arif Anwar; Ali, Salman; Surani, Asif; Zahid, Sohaib; Shoukat, Akber; Varon, Joseph; Surani, Salim

    2015-07-01

    To evaluate patterns of external injury resulting from bomb blasts in Karachi, and compare the injury profile resulting from explosions in open versus semi-confined blast environments. The retrospective, cross-sectional study was conducted in Karachi and comprised relevant data from January 2000 to October 2007. Casualty medical records and medico-legal certificates of the victims presented to three large public-sector hospitals were evaluated using a self-designed proforma. SPSS 17 was used for statistical analysis. Of the 1146 victims, data of 481(42%) represented the final study sample. Of these, 306(63.6%) were injured in open spaces and 175(36.4%) in semi-confined spaces. Of the 896 recorded injuries, lacerations were encountered as external injury in 427(47.7%) cases, followed by penetrating wounds in 137(15.3%). Lower and upper extremities were injured in 348(38.8%) and 170(19%) victims respectively. Open and semi-confined blast environments produced specific injury pattern and profile (pbomb blast attacks in Karachi demonstrated specific injury patterns and profiles. Further studies are required to account for internal injuries and classification of injuries based on standardised scoring systems.

  11. [Efficacy and safety of tulobuterol patch versus oral salbutamol sulfate in children with mild or moderate acute attack of bronchial asthma: a comparative study].

    Science.gov (United States)

    Lin, Qian; Liu, Quan-Hua; Bao, Yi-Xiao

    2013-06-01

    To compare tulobuterol patch and oral salbutamol sulfate in terms of efficacy and safety in children with mild or moderate acute attack of bronchial asthma. A total of 92 children with mild and moderate acute asthmatic attack were randomly divided into salbutamol group (n=46) and tulobuterol group (n=46). Both groups received routine treatment with antihistamine, selective leukotriene receptor antagonist and glucocorticoid. In addition, the salbutamol group was given slow-release capsules of salbutamol sulfate, and the tulobuterol group was treated with tulobuterol patch. The two groups were compared with respect to symptom scores of cough, wheeze, respiratory rate, wheezing sound, three depression sign and peak expiratory flow, as well as adverse events. As the treatment proceeded, symptom scores decreased in both groups; on the third day of treatment, all symptom scores except cough score showed a significant decrease in both groups (Pattack.

  12. Composite templates synthesis of mesoporous titania from industrial titanyl sulfate solution under external outfields

    International Nuclear Information System (INIS)

    Tian Congxue

    2008-01-01

    The precursors of mesoporous titania were synthesized via supra-molecular self-assembly route induced by composite templates (CTAB/P-123) from industrial titanyl sulfate solution under ultrasonic irradiation, microwave and hydrothermal condition. The hydrolysis and polycondensation rates of TiOSO 4 solution were controlled by adjusting the pH value at about 1.0. Mesoporous titania with anatase phase was obtained after templates removal by calcinations. The as-prepared powder was characterized by X-ray diffraction (XRD), N 2 isothermal adsorption-desorption, HRTEM and SAD. External outfields with enhancing polar action and soft hydrothermal condition were beneficial to prepare better mesoporous TiO 2 . Ultrasonic vibration promoted the formation of mesoporous structure. Under microwave irradiation, mesoporous TiO 2 was synthesized with BET specific surface area of 190.6 m 2 g -1 , average pore diameter of 2.57 nm and crystal size of 13.65 nm. And ultrasonic irradiation, microwave and hydrothermal conditions were making for forming and stabilizing the mesoporous structure

  13. The influence of alkali-free and alkaline shotcrete accelerators within cement systems Influence of the temperature on the sulfate attack mechanisms and damage

    International Nuclear Information System (INIS)

    Paglia, C.; Wombacher, F.; Boehni, H.

    2003-01-01

    The resistance to sulfate attack of mixtures accelerated with alkali-free and alkaline accelerators was found to be mainly influenced by the Al 3+ and SO 4 2- added via the admixtures. Microstructural observations showed decalcification and disintegration of the CSH gel, which acted as an additional Ca 2+ supplier as compared to the CH for ettringite formation. The CSH decalcification was mainly observed with a homogeneous distribution of the alkali-free admixture. The disintegration of the CSH gel increased the porosity and allowed more sulfate solution to penetrate into the specimens. This process promoted the swelling of the specimens and directly contributed to the expansion, explaining the lack of a direct relationship between the ettringite formation and the expansion. Moreover, the CSH gel disintegration, typical for MgSO 4 attack, also occurred with Na 2 SO 4 solutions and depending on the aluminate-sulfate distribution and the extent of the CSH gel disintegration, different damage types were detected. At higher temperatures (65 deg. C) the damage was mainly controlled by the growth, the rearrangement and the thermal stability of ettringite

  14. Puzzolanic cements of greater resistance at the attack of selenitic waters than the high sulfate resistance portland cements, and viceverse

    Directory of Open Access Journals (Sweden)

    Talero, Rafael

    1987-09-01

    Full Text Available This work confirms the certainty of the predictions of useful service given by Kaluosek and al. for the sulphate resistant portland cements (type V, USA, subject to severe selenitic attack. Two sulphate resistant portland cements, were tested by means of the Le Chatelier Anstett method. The tarts were destroyed at ages of three years, having detected in them the presence of thaumasite by XRD. Even so, the impossibility and possibility thaumasite formation was confirmed in pozzolanic cements tarts, which either had or did not have adequate amount of pozzolana (diatomite for such purpose.

    Este trabajo confirman las predicciones de vida útil dadas por Kalousek y colaboradores, para los cementos portland de elevada resistencia al ataque de los iones sulfato (tipo V, USA, sometidos a un severo ataque selenitoso. Se ensayaron dos cementos portland de elevada resistencia al ataque del yeso, mediante el ensayo de Le Chatelier-Anstett. Sus tortas correspondientes se destruyeron a la edad de tres años, habiéndose detectado en las mismas la presencia de thaumasita por DRX. Asimismo se confirmó la imposibilidad y posibilidad de formación de thaumasita en tortas de cementos puzolánicos, los cuales tenían, o no, respectivamente, una adecuada cantidad de puzolana (diatomita para tales fines.

  15. Assessing the external validity of model-based estimates of the incidence of heart attack in England: a modelling study

    Directory of Open Access Journals (Sweden)

    Peter Scarborough

    2016-11-01

    Full Text Available Abstract Background The DisMod II model is designed to estimate epidemiological parameters on diseases where measured data are incomplete and has been used to provide estimates of disease incidence for the Global Burden of Disease study. We assessed the external validity of the DisMod II model by comparing modelled estimates of the incidence of first acute myocardial infarction (AMI in England in 2010 with estimates derived from a linked dataset of hospital records and death certificates. Methods Inputs for DisMod II were prevalence rates of ever having had an AMI taken from a population health survey, total mortality rates and AMI mortality rates taken from death certificates. By definition, remission rates were zero. We estimated first AMI incidence in an external dataset from England in 2010 using a linked dataset including all hospital admissions and death certificates since 1998. 95 % confidence intervals were derived around estimates from the external dataset and DisMod II estimates based on sampling variance and reported uncertainty in prevalence estimates respectively. Results Estimates of the incidence rate for the whole population were higher in the DisMod II results than the external dataset (+54 % for men and +26 % for women. Age-specific results showed that the DisMod II results over-estimated incidence for all but the oldest age groups. Confidence intervals for the DisMod II and external dataset estimates did not overlap for most age groups. Conclusion By comparison with AMI incidence rates in England, DisMod II did not achieve external validity for age-specific incidence rates, but did provide global estimates of incidence that are of similar magnitude to measured estimates. The model should be used with caution when estimating age-specific incidence rates.

  16. Characterization and application of automated in-vacuum PIXE/EBS system for direct analysis of chloride and sulfate ions attack in cementitious materials

    Science.gov (United States)

    Rihawy, M. S.; Alwazzeh, M.; Abbas, K.

    2018-01-01

    Ion beam analysis (IBA) techniques (Particle Induced X-ray Emission, PIXE and Elastic Backscattering Spectrometry, EBS), were applied to investigate chloride and sulfate ions diffusion into laboratory prepared mortar samples. Development and characterization of an automated in-vacuum macro PIXE/EBS system is thoroughly discussed. Depth profile information of both chloride and sulfate ions in laboratory prepared mortar samples, after immersion in sea water for nine months, was rapidly and easily obtained at fairly low cost and with standardless analysis, demonstrating the value of the application of IBA to elemental depth profiling in cementitious materials. Chloride and sulfate depth profiles were obtained for two sets of mortar samples, one prepared with different water/cement (W/C) ratios and the other with different sand/cement (S/C) ratios. Results showed higher diffusion rates of both chloride and sulfate ions when both ratios are increased. Additionally, the W/C ratio has a stronger influence in both sulfate and chloride penetration than the S/C ratio, and chloride ions penetrate faster than sulfates. Advantages and limitations of applying IBA techniques in this investigation are discussed. The comparison between PIXE and other X-ray based analytical techniques, namely X-ray fluorescence (XRF) and energy and wavelength dispersive X-rays (EDX/WDX), as well as other traditional wet chemical methods is reviewed, and industrial applications are discussed.

  17. Sulfate and sulfide sulfur isotopes (δ34S and δ33S) measured by solution and laser ablation MC-ICP-MS: An enhanced approach using external correction

    Science.gov (United States)

    Pribil, Michael; Ridley, William I.; Emsbo, Poul

    2015-01-01

    Isotope ratio measurements using a multi-collector inductively coupled plasma mass spectrometer (MC-ICP-MS) commonly use standard-sample bracketing with a single isotope standard for mass bias correction for elements with narrow-range isotope systems measured by MC-ICP-MS, e.g. Cu, Fe, Zn, and Hg. However, sulfur (S) isotopic composition (δ34S) in nature can range from at least − 40 to + 40‰, potentially exceeding the ability of standard-sample bracketing using a single sulfur isotope standard to accurately correct for mass bias. Isotopic fractionation via solution and laser ablation introduction was determined during sulfate sulfur (Ssulfate) isotope measurements. An external isotope calibration curve was constructed using in-house and National Institute of Standards and Technology (NIST) Ssulfate isotope reference materials (RM) in an attempt to correct for the difference. The ability of external isotope correction for Ssulfate isotope measurements was evaluated by analyzing NIST and United States Geological Survey (USGS) Ssulfate isotope reference materials as unknowns. Differences in δ34Ssulfate between standard-sample bracketing and standard-sample bracketing with external isotope correction for sulfate samples ranged from 0.72‰ to 2.35‰ over a δ34S range of 1.40‰ to 21.17‰. No isotopic differences were observed when analyzing Ssulfide reference materials over a δ34Ssulfide range of − 32.1‰ to 17.3‰ and a δ33S range of − 16.5‰ to 8.9‰ via laser ablation (LA)-MC-ICP-MS. Here, we identify a possible plasma induced fractionation for Ssulfate and describe a new method using external isotope calibration corrections using solution and LA-MC-ICP-MS.

  18. Behaviour of cementitious materials: sulfates and temperature actions

    International Nuclear Information System (INIS)

    Barbarulo, Remi

    2002-09-01

    The research work presented in this Ph.D. thesis is related to the nuclear waste underground repository concept. Concrete could be used in such a repository, and would be subjected to variations of temperature in presence of sulfate, a situation that could induce expansion of concrete. The research was lead in three parts: an experimental study of the possibility of an internal sulfate attack on mortars; an experimental study and modeling of the chemical equilibriums of the CaO-SiO 2 -Al 2 O 3 -SO 3 -H 2 O system; and a modeling of the mechanisms of internal and external sulfate attacks, and the effect of temperature. The results show that mortars can develop expansions after a steam-cure during hydration, but also when a long steam-cure is applied to one-year-old mortars, which is a new point. Ettringite precipitation can be considered as responsible for these expansions. The experimental study of the CaO-SiO 2 -Al 2 O 3 -SO 3 -H 2 O system clarified the role of Calcium Silicate Hydrates (C-S-H) on chemical equilibriums of cementitious materials. Sulfate sorption on C-S-H has been studied in detail. The quantity of sulfate bound to the C-S-H mainly depends on the sulfate concentration in solution, on the Ca/Si ratio of the C-S-H and is not significantly influenced by temperature. Aluminium inclusion in the C-S-H seems to be a significant phenomenon. Temperature increases the calcium sulfo-aluminate solubilities and thus increases sulfates concentration in solution. A modeling of the chemical system is proposed. Simulations of external sulfate attack (15 mmol/L of Na 2 SO 4 ) predict ettringite precipitation at 20 and 85±C. Simulation of internal sulfate attack was performed at a local scale (a hydrated cement grain). An initial inhomogeneity can lead, after a thermal curing at 85±C, to ettringite precipitation in zones originally free from ettringite. This new-formed ettringite could be the origin of the expansions. (author) [fr

  19. Atrial fibrillation detected by external loop recording for seven days or two-day simultaneous Holter recording: A comparison in patients with ischemic stroke or transient ischemic attack.

    Science.gov (United States)

    Sejr, Michala Herskind; Nielsen, Jens Cosedis; Damgaard, Dorte; Sandal, Birgitte Forsom; May, Ole

    Atrial fibrillation (AF) is the most common cardiac cause of ischemic stroke and transient ischemic attack (IS/TIA). To compare the diagnostic value of seven-day external loop recording (ELR) and two-day Holter recording for detecting AF after IS/TIA. 191 IS/TIA patients without AF history. Endpoint was AF >30s. We started two-day Holter recording and seven-day ELR simultaneously. Seven-day ELR and two-day Holter recording detected the same three AF patients. ELR detected another six patients with AF adjudicated by cardiologists, four detections after Holter (3 vs. 7, p=0.125) and two false-positive detections during Holter. Seven-day ELR automatically classified 50/191 patients (26%) with AF, but only 7/50 (14%) were confirmed as AF by cardiologists. Seven-day ELR did not detect significantly more patients with AF than two-day Holter recording. 86% of patients with ELR-classified AF were false positives, indicating a poor performance of the automatic AF detection algorithm used. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Sulfate resistance of nanosilica contained Portland cement mortars

    Science.gov (United States)

    Batilov, Iani B.

    Soils, sea water and ground water high in sulfates are commonly encountered hostile environments that can attack the structure of concrete via chemical and physical mechanisms which can lead to costly repairs or replacement. Sulfate attack is a slow acting deteriorative phenomenon that can result in cracking, spalling, expansion, increased permeability, paste-to-aggregate bond loss, paste softening, strength loss, and ultimately, progressive failure of concrete. In the presented research study, Portland cement (PC) mortars containing 1.5% to 6.0% nanosilica (nS) cement replacement by weight were tested for sulfate resistance through full submersion in sodium sulfate to simulate external sulfate attack. Mortars with comparable levels of cement replacement were also prepared with microsilica (mS). Three cement types were chosen to explore nS' effectiveness to reduce sulfate expansion, when paired with cements of varying tricalcium aluminate (C3A) content and Blaine fineness, and compare it to that of mS. Mortars were also made with combined cement replacement of equal parts nS and mS to identify if they were mutually compatible and beneficial towards sulfate resistance. Besides sulfate attack expansion of mortar bars, the testing program included investigations into transport and microstructure properties via water absorption, sulfate ion permeability, porosimetry, SEM with EDS, laser diffraction, compressive strength, and heat of hydration. Expansion measurements indicated that mS replacement mortars outperformed both powder form nS, and nS/mS combined replacement mixtures. A negative effect of the dry nS powder replacement attributed to agglomeration of its nanoparticles during mixing negated the expected superior filler, paste densification, and pozzolanic activity of the nanomaterial. Agglomerated nS was identified as the root cause behind poor performance of nS in comparison to mS for all cement types, and the control when paired with a low C3A sulfate resistant

  1. DEF: As a form of sulfate attack

    OpenAIRE

    Skalny, J.; Johansen, V.; Thaulow, N.; Palomo, A.

    1996-01-01

    Delayed ettringite formation (DEF) is the term used to describe expansion of some heat cured portland cement concretes. Although meaningful progress has been made, the exact mechanism of the expansion itself is not entirely understood. The ettringite reformation is enabled, primarily, by thermal decomposition of ettringite formed prior to or during the cement paste setting as a result of excessive/improper heat curing. Observance in mature concrete of crystalline ettringite in air voids, crac...

  2. DEF: As a form of sulfate attack

    Directory of Open Access Journals (Sweden)

    Skalny, J.

    1996-12-01

    Full Text Available Delayed ettringite formation (DEF is the term used to describe expansion of some heat cured portland cement concretes. Although meaningful progress has been made, the exact mechanism of the expansion itself is not entirely understood. The ettringite reformation is enabled, primarily, by thermal decomposition of ettringite formed prior to or during the cement paste setting as a result of excessive/improper heat curing. Observance in mature concrete of crystalline ettringite in air voids, cracks, and gaps around the aggregate is not in itself an evidence for DEF, but is the consequence of natural recrystallization of ettringite into available larger spaces. Occurance of DEF is dependent on materials, curing, and environmental conditions, and can easily be distinguished from ASR and other deterioration mechanisms by optical and electron-optical methods.

    DEF es el término habitualmente usado para describir la expansión que sufren algunos hormigones de cemento Portland que han sido curados con la ayuda de un tratamiento térmico. DEF es la abreviatura de la expresión inglesa "Delayed Ettringite Formation" que en español se podría traducir como "Formación de Etringita Retrasada". Aunque en los últimos tiempos se ha progresado significativamente, aún hoy día no se entiende completamente el mecanismo exacto de la expansión en sí misma. La formación de una etringita tardía es, en principio, consecuencia de la descomposición térmica de la etringita formada con anterioridad o durante el fraguado de la pasta de cemento, por un exceso de calor o inadecuado proceso de curado térmico. La observación, en el hormigón maduro, de etringita cristalina en poros, fisuras y en las interfases pasta-áridos no es en sí una evidencia de la DEF, pero sí es una consecuencia de la natural recristalización de la etringita en espacios disponibles. El fenómeno de la DEF depende de los materiales, del curado y de las condiciones ambientales, y puede fácilmente distinguirse por medio de la microscopía óptica y eletrónica de la reacción árido-álcali (ASR y de otros mecanismos de deterioro.

  3. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  4. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  5. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  6. Dissolution of sulfate scales

    Energy Technology Data Exchange (ETDEWEB)

    Hen, J.

    1991-11-26

    This patent describes a composition for the removal of sulfate scale from surfaces. It comprises: an aqueous solution of about 0.1 to 1.0 molar concentration of an aminopolycarboxylic acid (APCA) containing 1 to 4 amino groups or a salt thereof, and about 0.1 to 1.0 molar concentration of a second component which is diethylenetriaminepenta (methylenephosphonic acid) (DTPMP) or a salt thereof, or aminotri (methylenephosphonic acid) (ATMP) or a salt thereof as an internal phase enveloped by a hydrocarbon membrane phase which is itself emulsified in an external aqueous phase, the hydrocarbon membrane phase continuing a complexing agent weaker for the cations of the sulfate scale than the APCA and DTPMP or ATMP, any complexing agent for the cations in the external aqueous phase being weaker than that in the hydrocarbon membrane phase.

  7. Evaluating performance-based test and specifications for sulfate resistance in concrete

    Science.gov (United States)

    2000-12-01

    This research project involved an experimental evaluation of the sulfate resistance of various concretes and mortars for the purpose of establishing performance-based specifications for the durability of concrete against sulfate attack. The research ...

  8. Accelerated test for measuring sulfate resistance of hydraulic cements for Caltrans LLPRS program

    Science.gov (United States)

    2000-04-01

    Many California soils are rich in sulfates, which can have deleterious effects on the cements used in rigid pavements. Field experience has demonstrated that sulfate attack usually manifests itself in the form of loss of adhesion and strength. In ord...

  9. Glucosamine Sulfate

    Science.gov (United States)

    ... and becomes thin. This results in more joint friction, pain, and stiffness. Researchers think that taking glucosamine ... pregnant or breast-feeding. Asthma: There is one report linking an asthma attack with taking glucosamine. It ...

  10. Barium Sulfate

    Science.gov (United States)

    ... uses a computer to put together x-ray images to create cross-sectional or three dimensional pictures of the inside of the body). Barium sulfate is in a class of medications called radiopaque contrast media. It works by coating the esophagus, stomach, or ...

  11. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  14. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Sulfate adsorption on goethite

    Energy Technology Data Exchange (ETDEWEB)

    Rietra, R P.J.J.; Hiemstra, T; Riemsdijk, W.H. van

    1999-10-15

    Recent spectroscopic work has suggested that only one surface species of sulfate is dominant on hematite. Sulfate is therefore a very suitable anion to test and develop adsorption models for variable charge minerals. The authors have studied sulfate adsorption on goethite covering a large range of sulfate concentrations, surface coverages, pH values, and electrolyte concentrations. Four different techniques were used to cover the entire range of conditions. For characterization at low sulfate concentrations, below the detection limit of sulfate with ICP-AES, the authors used proton-sulfate titrations at constant pH. Adsorption isotherms were studied for the intermediate sulfate concentration range. Acid-base titrations in sodium sulfate and electromobility were used for high sulfate concentrations. All the data can be modeled with one adsorbed species if it is assumed that the charge of adsorbed sulfate is spatially distributed in the interface. The charge distribution of sulfate follows directly from modeling the proton-sulfate adsorption stoichoimemtry sine this stoichiometry is independent of the intrinsic affinity constant of sulfate. The charge distribution can be related to the structure of the surface complex by use of the Pauling bond valence concept and is in accordance with the microscopic structure found by spectroscopy. The intrinsic affinity constant follows from the other measurements. Modeling of the proton-ion stoichoimetry with the commonly used 2-pK models, where adsorbed ions are treated as point charges, is possible only if at least two surface species for sulfate are used.

  17. Effect of light, carbon dioxide, and nitrogen nutrition on the incorporation of S from external sulfate into different S-containing fractions in Scenedesmus, with special reference to lipid S

    Energy Technology Data Exchange (ETDEWEB)

    Kylin, A

    1966-01-01

    Incorporation of S from the sulfate in the medium into normal cells of Scenedesmus was enhanced by light, relatively most in the case of lipid S and least in the inorganic sulfate fraction. The effects of light were, generally, increased by the presence of CO/sub 2/ and nitrogen salts. CO/sub 2/ did not significantly alter the proportions between the fractions, but the presence of nitrogen increased the formation of protein S more than the synthesis of S-containing lipids. It is suggested that lipid S is formed as a sink, when a step between sulfite and -SH becomes increasingly rate-limiting in the overall reduction of sulfate. Furthermore, incorporation as SO/sub 4//sup 2 -/ and as lipid S may be regulated by more or less independent processes. 15 references, 2 tables.

  18. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  19. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  20. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  4. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  5. Regional Externalities

    NARCIS (Netherlands)

    Heijman, W.J.M.

    2007-01-01

    The book offers practical and theoretical insights in regional externalities. Regional externalities are a specific subset of externalities that can be defined as externalities where space plays a dominant role. This class of externalities can be divided into three categories: (1) externalities

  6. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  7. Rare earth sulfates

    International Nuclear Information System (INIS)

    Komissarova, L.N.; Shatskij, V.M.; Pokrovskij, A.N.; Chizhov, S.M.; Bal'kina, T.I.; Suponitskij, Yu.L.

    1986-01-01

    Results of experimental works on the study of synthesis conditions, structure and physico-chemical properties of rare earth, scandium and yttrium sulfates, have been generalized. Phase diagrams of solubility and fusibility, thermodynamic and crystallochemical characteristics, thermal stability of hydrates and anhydrous sulfates of rare earths, including normal, double (with cations of alkali and alkaline-earth metals), ternary and anion-mixed sulfates of rare earths, as well as their adducts, are considered. The state of ions of rare earths, scandium and yttrium in aqueous sulfuric acid solutions is discussed. Data on the use of rare earth sulfates are given

  8. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  11. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  13. The ceric sulfate dosimeter

    DEFF Research Database (Denmark)

    Bjergbakke, Erling

    1970-01-01

    The process employed for the determination of absorbed dose is the reduction of ceric ions to cerous ions in a solution of ceric sulfate and cerous sulfate in 0.8N sulfuric acid: Ce4+→Ce 3+ The absorbed dose is derived from the difference in ceric ion concentration before and after irradiation...

  14. Heparan sulfate biosynthesis

    DEFF Research Database (Denmark)

    Multhaupt, Hinke A B; Couchman, John R

    2012-01-01

    Heparan sulfate is perhaps the most complex polysaccharide known from animals. The basic repeating disaccharide is extensively modified by sulfation and uronic acid epimerization. Despite this, the fine structure of heparan sulfate is remarkably consistent with a particular cell type. This suggests...... that the synthesis of heparan sulfate is tightly controlled. Although genomics has identified the enzymes involved in glycosaminoglycan synthesis in a number of vertebrates and invertebrates, the regulation of the process is not understood. Moreover, the localization of the various enzymes in the Golgi apparatus has......-quality resolution of the distribution of enzymes. The EXT2 protein, which when combined as heterodimers with EXT1 comprises the major polymerase in heparan sulfate synthesis, has been studied in depth. All the data are consistent with a cis-Golgi distribution and provide a starting point to establish whether all...

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  17. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  18. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  19. Ferrous Sulfate (Iron)

    Science.gov (United States)

    ... are allergic to ferrous sulfate, any other medications tartrazine (a yellow dye in some processed foods and ... in, tightly closed, and out of reach of children. Store it at room temperature and away from ...

  20. Holothurian Fucosylated Chondroitin Sulfate

    Directory of Open Access Journals (Sweden)

    Vitor H. Pomin

    2014-01-01

    Full Text Available Fucosylated chondroitin sulfate (FucCS is a structurally distinct glycosaminoglycan found in sea cucumber species. It has the same backbone composition of alternating 4-linked glucuronic acid and 3-linked N-acetyl galactosamine residues within disaccharide repeating units as regularly found in mammalian chondroitin sulfates. However, FucCS has also sulfated fucosyl branching units 3-O-linked to the acid residues. The sulfation patterns of these branches vary accordingly with holothurian species and account for different biological actions and responses. FucCSs may exhibit anticoagulant, antithrombotic, anti-inflammatory, anticancer, antiviral, and pro-angiogenic activities, besides its beneficial effects in hemodialysis, cellular growth modulation, fibrosis and hyperglycemia. Through an historical overview, this document covers most of the science regarding the holothurian FucCS. Both structural and medical properties of this unique GAG, investigated during the last 25 years, are systematically discussed herein.

  1. DHEA-sulfate test

    Science.gov (United States)

    ... DHEA sulfate may be due to: Adrenal gland disorders that produce lower than normal amounts of adrenal hormones, including adrenal insufficiency and Addison disease The pituitary gland not producing normal amounts of its hormones ( hypopituitarism ) ...

  2. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  4. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  5. Direct Sulfation of Limestone

    DEFF Research Database (Denmark)

    Hu, Guilin; Dam-Johansen, Kim; Wedel, Stig

    2007-01-01

    The direct sulfation of limestone was studied in a laboratory fixed-bed reactor. It is found that the direct sulfation of limestone involves nucleation and crystal grain growth of the solid product (anhydrite). At 823 K and at low-conversions (less than about 0.5 %), the influences of SO2, O-2...... and CO2 on the direct sulfation of limestone corresponds to apparent reaction orders of about 0.2, 0.2 and -0.5, respectively. Water is observed to promote the sulfation reaction and increase the apparent reaction orders of SO2 and O-2. The influence of O-2 at high O-2 concentrations (> about 15...... %) becomes negligible. In the temperature interval from 723 K to 973 K, an apparent activation energy of about 104 kJ/mol is observed for the direct sulfation of limestone. At low temperatures and low conversions, the sulfation process is most likely under mixed control by chemical reaction and solid...

  6. Assessment of Mechanical Properties and Damage of High Performance Concrete Subjected to Magnesium Sulfate Environment

    Directory of Open Access Journals (Sweden)

    Sheng Cang

    2017-01-01

    Full Text Available Sulfate attack is one of the most important problems affecting concrete structures, especially magnesium sulfate attack. This paper presents an investigation on the mechanical properties and damage evolution of high performance concrete (HPC with different contents of fly ash exposure to magnesium sulfate environment. The microstructure, porosity, mass loss, dimensional variation, compressive strength, and splitting tensile strength of HPC were investigated at various erosion times up to 392 days. The ultrasonic pulse velocity (UPV propagation in HPC at different erosion time was determined by using ultrasonic testing technique. A relationship between damage and UPV of HPC was derived according to damage mechanics, and a correlation between the damage of HPC and erosion time was obtained eventually. The results indicated that (1 the average increasing amplitude of porosity for HPCs was 34.01% before and after exposure to magnesium sulfate solution; (2 the damage evolution of HPCs under sulfate attack could be described by an exponential fitting; (3 HPC containing 20% fly ash had the strongest resistance to magnesium sulfate attack.

  7. Evaluation of sulfate resistance of cement mortars containing black rice husk ash.

    Science.gov (United States)

    Chatveera, B; Lertwattanaruk, P

    2009-03-01

    In this paper, black rice husk ashes (BRHAs), which are agrowastes from an electricity generating power plant and a rice mill, were ground and used as a partial cement replacement. The durability of mortars under sulfate attack including expansion and compressive strength loss were investigated. For parametric study, BRHA were used as a Portland cement Type 1 replacement at the levels of 0%, 10%, 30%, and 50% by weight of binder. The water-to-binder ratios were 0.55 and 0.65. For the durability of mortar exposed to sulfate attack, 5% sodium sulfate (Na2SO4) and magnesium sulfate (MgSO4) solutions were used. As a result, when increasing the percentage replacement of BRHA, the expansion and compressive strength loss of mortar decreased. At the replacement levels of 30% and 50% of BRHA, the expansion of the mortars was less than those mixed with sulfate-resistant cement. However, the expansion of the mortars exposed to Na2SO4 was more than those exposed to MgSO4. Increasing the replacement level of BRHA tends to reduce the compressive strength loss of mortars exposed to Na2SO4 attack. In contrary, under MgSO4 attack, when increasing the replacement level of BRHA, the compressive strength loss increases from 0% to 50% in comparison to Portland cement mortar. Results show that ground BRHA can be applied as a pozzolanic material to concrete and also improve resistance to sodium sulfate attack, but it can impair resistance to magnesium sulfate attack.

  8. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  9. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  10. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  11. Quantification and isotopic analysis of intracellular sulfur metabolites in the dissimilatory sulfate reduction pathway

    Science.gov (United States)

    Sim, Min Sub; Paris, Guillaume; Adkins, Jess F.; Orphan, Victoria J.; Sessions, Alex L.

    2017-06-01

    Microbial sulfate reduction exhibits a normal isotope effect, leaving unreacted sulfate enriched in 34S and producing sulfide that is depleted in 34S. However, the magnitude of sulfur isotope fractionation is quite variable. The resulting changes in sulfur isotope abundance have been used to trace microbial sulfate reduction in modern and ancient ecosystems, but the intracellular mechanism(s) underlying the wide range of fractionations remains unclear. Here we report the concentrations and isotopic ratios of sulfur metabolites in the dissimilatory sulfate reduction pathway of Desulfovibrio alaskensis. Intracellular sulfate and APS levels change depending on the growth phase, peaking at the end of exponential phase, while sulfite accumulates in the cell during stationary phase. During exponential growth, intracellular sulfate and APS are strongly enriched in 34S. The fractionation between internal and external sulfate is up to 49‰, while at the same time that between external sulfate and sulfide is just a few permil. We interpret this pattern to indicate that enzymatic fractionations remain large but the net fractionation between sulfate and sulfide is muted by the closed-system limitation of intracellular sulfate. This 'reservoir effect' diminishes upon cessation of exponential phase growth, allowing the expression of larger net sulfur isotope fractionations. Thus, the relative rates of sulfate exchange across the membrane versus intracellular sulfate reduction should govern the overall (net) fractionation that is expressed. A strong reservoir effect due to vigorous sulfate reduction might be responsible for the well-established inverse correlation between sulfur isotope fractionation and the cell-specific rate of sulfate reduction, while at the same time intraspecies differences in sulfate uptake and/or exchange rates could account for the significant scatter in this relationship. Our approach, together with ongoing investigations of the kinetic isotope

  12. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  14. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  15. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  16. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  17. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  18. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  19. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  20. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  1. Sulfate metabolism. I. Sulfate uptake and redistribution of acid rain sulfate by edible plants

    International Nuclear Information System (INIS)

    Dallam, R.D.

    1987-01-01

    Sulfur is the major component of polluted air in industrialized societies. Atmospheric sulfur is converted to sulfuric acid through a series of chemical reactions which can eventually reenter many ecosystems. When edible plants are grown in soils containing varying amounts of sulfate, the roots take up and transport inorganic sulfate to the stems and leaves. The sulfate taken up by the roots and the amount transported to the stem and leaves was found to be a function of the concentration of sulfate in the soil. Inorganic sulfate taken up by a corn plant seedling can be rapidly converted to organic sulfate by the root system. Nine days after one of a pair of pea plants was inoculated with artificial acid rain sulfate (dilute H 2 35 SO 4 ) it was found that the sulfate was translocated not only in the inoculated plant, but also to the uninoculated pea plant in the same container. Also, when the leaves of a mature potato plant were inoculated with artificial acid rain sulfate it was found that the sulfate was translocated into the edible potatoes. Fractionation of the potatoes showed that most of the sulfate was water soluble of which 30% was inorganic sulfate and 70% was in the form of organic sulfur. One third of the non-water soluble translocated acid rain sulfate was equally divided between lipid and non-lipid organic sulfur of the potato. 9 references, 2 figures, 5 tables

  2. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  3. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  4. How to Distinguish Attacks by the Black Turpentine Beetle and Dioryctria Amatella on Southern Pines

    Science.gov (United States)

    Carl W. Fatzinger; Gary L. DeBarr

    1969-01-01

    Trunk attacks by the black turpentine beetle, Dendroctonus terebrans (Oh.), and the larvae of Dioryctria amatella (Hulst) on the southern pines results in a copious flow of pitch. This external pitch mass or pitch tube exhibits characteristics that can be used as symptoms to distinguish between attacks by these two insects.

  5. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Radioimmunoassay of dehydroepiandrosterone sulfate

    International Nuclear Information System (INIS)

    Vieira, J.G.H.; Furlanetto, R.P.; Russo, E.M.K.; Noguti, K.O.; Chacra, A.R.

    1980-01-01

    The development of a radioimmunological method for the measurement of dehydroepiandrosterone sulfate in serum is described. For the immunization of rabbits, a DHA-3-hemissuccinate-bovine serum albumin conjugate was synthetized and a highly specific anti-serum was produced. The method developed requires only simple dilution prior to assay and the normal values for the different age groups were determined in 146 normal individuals. (Author) [pt

  8. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  9. Sulfation of chondroitin. Specificity, degree of sulfation, and detergent effects with 4-sulfating and 6-sulfating microsomal systems

    International Nuclear Information System (INIS)

    Sugumaran, G.; Silbert, J.E.

    1988-01-01

    Microsomal preparations from chondroitin 6-sulfate-producing chick embryo epiphyseal cartilage, and from chondroitin 4-sulfate-producing mouse mastocytoma cells, were incubated with UDP-[14C]glucuronic acid and UDP-N-acetylgalactosamine to form non-sulfated proteo[14C]chondroitin. Aliquots of the incubations were then incubated with 3'-phosphoadenylylphosphosulfate (PAPS) in the presence or absence of various detergents. In the absence of detergents, there was good sulfation of this endogenous proteo[14C]chondroitin by the original microsomes from both sources. Detergents, with the exception of Triton X-100, markedly inhibited sulfation in the mast cell system but not in the chick cartilage system. These results indicate that sulfation and polymerization are closely linked on cell membranes and that in some cases this organization can be disrupted by detergents. When aliquots of the original incubation were heat inactivated, and then reincubated with new microsomes from chick cartilage and/or mouse mastocytoma cells plus PAPS, there was no significant sulfation of this exogenous proteo[14C] chondroitin with either system unless Triton X-100 was added. Sulfation of exogenous chondroitin and chondroitin hexasaccharide was compared with sulfation of endogenous and exogenous proteo[14C]chondroitin. Sulfate incorporation into hexasaccharide and chondroitin decreased as their concentrations (based on uronic acid) approached that of the proteo[14C]chondroitin. At the same time, the degree of sulfation in percent of substituted hexosamine increased. However, the degree of sulfation did not reach that of the endogenous proteo[14C]chondroitin. Hexasaccharide and chondroitin sulfation were stimulated by the presence of Triton X-100. However, in contrast to the exogenous proteo[14C]chondroitin, there was some sulfation of hexasaccharide and chondroitin in the absence of this detergent

  10. Enhanced sulfate reduction with acidogenic sulfate-reducing bacteria

    International Nuclear Information System (INIS)

    Wang Aijie; Ren Nanqi; Wang Xu; Lee Duujong

    2008-01-01

    Sulfate reduction in a continuous flow, acidogenic reactor using molasses wastewater as the carbon source was studied at varying chemical oxygen demand/sulfate (COD/SO 4 2- ) ratios. At a critical COD/SO 4 2- ratio of 2.7, neither COD nor sulfate were in excess for extra production of ethanol or acetate in the reactor. An acetic-type microbial metabolism was established with sulfate-reducing bacteria (SRB) significantly consuming hydrogen and volatile fatty acids produced by acidogenic bacteria and hydrogen producing acetogens in degrading COD, thereby yielding sulfate removal rate >94.6%. A low critical COD/SO 4 2- ratio of 1.6 was also observed with the enriched ASRB population in reactor which overcomes the barrier to the treatment capability of sulfate-laden wastewater treatment with limited COD supply

  11. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  12. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  13. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  14. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  15. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2012-01-01

    Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest

  16. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2011-01-01

    There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec

  17. Blood flow velocity in migraine attacks - a transcranial Doppler study

    International Nuclear Information System (INIS)

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D.

    1991-01-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs

  18. Blood flow velocity in migraine attacks - a transcranial Doppler study

    Energy Technology Data Exchange (ETDEWEB)

    Zwetsloot, C.P.; Caekebeke, J.F.V.; Jansen, J.C.; Odink, J.; Ferrari, M.D. (Rijksuniversiteit Leiden (Netherlands))

    1991-05-01

    A pulsed Doppler device was used to measure blood flow velocities in the common carotid artery, the extracranial part of the internal carotid artery, the external carotid artery, the middle cerebral artery, and the anterior cerebral artery in 31 migraneurs without aura (n=27) and with aura (n=4), both during and ouside an attack. The aims were to compare blood flow velocity during and between migraine attacks and to study asymmetries of the blood flow velocity. Compared with blood flow velocity values obtained in the attack-free interval, blood flow velocity was lower during attacks without aura in both common carotid arteries, but not in the other extra- and intracranial vessels which were examined. However, during attacks of migraine with aura, blood flow velocity tended to be lower in all examined vessels. There were no asymmetries of the blood flow velocity. It is suggested that during migraine attacks without aura there is a dissociation in blood flow regulation in the common carotid and middle cerebral arteries. 20 refs., 2 tabs.

  19. Surface Corrosion and Microstructure Degradation of Calcium Sulfoaluminate Cement Subjected to Wet-Dry Cycles in Sulfate Solution

    Directory of Open Access Journals (Sweden)

    Wuman Zhang

    2017-01-01

    Full Text Available The hydration products of calcium sulfoaluminate (CSA cement are different from those of Portland cement. The degradation of CSA cement subjected to wet-dry cycles in sulfate solution was studied in this paper. The surface corrosion was recorded and the microstructures were examined by scanning electron microscopy (SEM. The results show that SO42-, Na+, Mg2+, and Cl− have an effect on the stability of ettringite. In the initial period of sulfate attack, salt crystallization is the main factor leading to the degradation of CSA cement specimens. The decomposition and the carbonation of ettringite will cause long-term degradation of CSA cement specimens under wet-dry cycles in sulfate solution. The surface spalling and microstructure degradation increase significantly with the increase of wet-dry cycles, sulfate concentration, and water to cement ratio. Magnesium sulfate and sodium chloride reduce the degradation when the concentration of sulfate ions is a constant value.

  20. Syndecan heparan sulfate proteoglycans

    DEFF Research Database (Denmark)

    Gomes, Angélica Maciel; Sinkeviciute, Dovile; Multhaupt, Hinke A.B.

    2016-01-01

    discuss how, in partial catabolic processes, new roles for HSPGs emerge that affect cell behavior. Examples from tumor studies are emphasized, since HSPGs may be altered in composition and distribution and may also represent targets for the development of new therapeutics....... signaling can therefore be complex, but it is now known that syndecans are capable of independent signaling. This review is divided in two sections, and will first discuss how the assembly of heparan sulfate, the anabolic process, encodes information related to ligand binding and signaling. Second, we...

  1. Euglena mitochondria and chloroplasts form tyrosine-O-sulfate

    Energy Technology Data Exchange (ETDEWEB)

    Saidha, T.; Hanfstingl, U.; Schiff, J.A. (Brandeis Univ., Waltham, MA (USA))

    1989-04-01

    Mitochondria from light-grown wild-type Euglena gracilis var. bacillaris Cori or dark-grown mutant W{sub 10}BSmL incubated with {sup 35}SO{sub 4}{sup 2{minus}} and ATP, or with {sup 14}C-tyrosine, non-radioactive sulfate and ATP accumulate a labeled compound in the medium. Since this compound shows exact coelectrophoresis with tyrosine-O-sulfate (TOS) at pH 2.0, 5.8 or 8.0., yields sulfate and tyrosine on acid hydrolysis, and treatment with aryl sulfatase from Aerobacter aerogenes yields sulfate and tyrosine but no tyrosine methyl ester, it is identified as TOS. No TOS is found outside purified developing chloroplasts incubated with {sup 35}SO{sub 4}{sup 2{minus}} and ATP, but both chloroplasts and mitochondria form to {sup 35}S externally when incubated with adenosine 3{prime} phosphate 5{prime}phospho({sup 35}S) sulfate (PAP{sup 35}S). Since no tyrosine need be added, tyrosine is provided from endogenous sources. Although TOS is found in the free pool of Euglena cells it cannot be detected in proteins of cells or mucus ruling our sulfation of tyrosine of protein or incorporation of TOS into proteins. The system forming TOS is membrane-bound and may be involved in tyrosine transport.

  2. 2-Amino-4-hydroxyethylaminoanisole sulfate

    DEFF Research Database (Denmark)

    Madsen, Jakob T; Andersen, Klaus E

    2016-01-01

    positive patch test reactions to the coupler 2-amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014. METHODS: Patch test results from the Allergen Bank database for eczema patients patch tested with 2-amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014 were reviewed. RESULTS......: A total of 902 dermatitis patients (154 from the dermatology department and 748 from 65 practices) were patch tested with amino-4-hydroxyethylaminoanisole sulfate 2% pet. from 2005 to 2014. Thirteen (1.4%) patients had a positive patch test reaction. Our results do not indicate irritant reactions....... CONCLUSIONS: 2-Amino-4-hydroxyethylaminoanisole sulfate is a new but rare contact allergen....

  3. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  4. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  5. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  6. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  7. Morpholine-4-carboxamidinium sulfate

    Directory of Open Access Journals (Sweden)

    Ioannis Tiritiris

    2016-01-01

    Full Text Available The asymmetric unit of the title salt, 2C5H12N3O+·SO42−, comprises two cations and one sulfate ion. In both cations, the C, N and O atoms of the morpholine rings are disordered over two sets of sites, with refined occupancies of 0.849 (3:0.151 (3 for cation I and 0.684 (4:0.316 (4 for cation II. The C—N bond lengths in both central C3N units of the carboxamidinium ions range between 1.253 (12 and 1.362 (5 Å, indicating a degree of double-bond character. The central C atoms are bonded to the three N atoms in a nearly ideal trigonal–planar geometry and the positive charges are delocalized in both CN3 planes. The crystal structure is stabilized by a three-dimensional network of N—H...O hydrogen bonds between the cations and the sulfate ion. Scheme tiny font, charges and delocalized bonds almost invisible

  8. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  10. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  12. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  13. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  15. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  16. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  17. Pipe Lines – External Corrosion

    Directory of Open Access Journals (Sweden)

    Dan Babor

    2008-01-01

    Full Text Available Two areas of corrosion occur in pipe lines: corrosion from the medium carried inside the pipes; corrosion attack upon the outside of the pipes (underground corrosion. Electrolytic processes are also involved in underground corrosion. Here the moisture content of the soil acts as an electrolyte, and the ions required to conduct the current are supplied by water-soluble salts (chlorides, sulfates, etc. present in the soil. The nature and amount of these soluble materials can vary within a wide range, which is seen from the varying electrical conductivity and pH (varies between 3 and 10. Therefore the characteristics of a soil will be an important factor in under-ground corrosion.

  18. INTRACELLULAR SYNTHESIS OF CHONDROITIN SULFATE

    Science.gov (United States)

    Dziewiatkowski, Dominic D.

    1962-01-01

    In autoradiograms of slices of costal cartilage, incubated for 4 hours in a salt solution containing S35-sulfate and then washed extensively and dehydrated, about 85 per cent of the radioactivity was assignable to the chondrocytes. From alkaline extracts of similarly prepared slices of cartilage, 64 to 83 per cent of the total sulfur-35 in the slices was isolated as chondroitin sulfate by chromatography on an anion-exchange resin. In view of the estimate that only about 15 per cent of the radioactivity was in the matrix, the isolation of 64 to 83 per cent of the total sulfur-35 as chondroitin sulfate is a strong argument that the chondrocytes are the loci in which chondroitin sulfate(s) is synthesized. PMID:13888910

  19. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  2. Heparan sulfate and cell division

    Directory of Open Access Journals (Sweden)

    Porcionatto M.A.

    1999-01-01

    Full Text Available Heparan sulfate is a component of vertebrate and invertebrate tissues which appears during the cytodifferentiation stage of embryonic development. Its structure varies according to the tissue and species of origin and is modified during neoplastic transformation. Several lines of experimental evidence suggest that heparan sulfate plays a role in cellular recognition, cellular adhesion and growth control. Heparan sulfate can participate in the process of cell division in two distinct ways, either as a positive or negative modulator of cellular proliferation, or as a response to a mitogenic stimulus.

  3. Final report on the safety assessment of sodium cetearyl sulfate and related alkyl sulfates as used in cosmetics.

    Science.gov (United States)

    Fiume, Monice; Bergfeld, Wilma F; Belsito, Donald V; Klaassen, Curtis D; Marks, James G; Shank, Ronald C; Slaga, Thomas J; Snyder, Paul W; Alan Andersen, F

    2010-05-01

    Sodium cetearyl sulfate is the sodium salt of a mixture of cetyl and stearyl sulfate. The other ingredients in this safety assessment are also alkyl salts, including ammonium coco-sulfate, ammonium myristyl sulfate, magnesium coco-sulfate, sodium cetyl sulfate, sodium coco/hydrogenated tallow sulfate, sodium coco-sulfate, sodium decyl sulfate, sodium ethylhexyl sulfate, sodium myristyl sulfate, sodium oleyl sulfate, sodium stearyl sulfate, sodium tallow sulfate, sodium tridecyl sulfate, and zinc coco-sulfate. These ingredients are surfactants used at concentrations from 0.1% to 29%, primarily in soaps and shampoos. Many of these ingredients are not in current use. The Cosmetic Ingredient Review (CIR) Expert Panel previously completed a safety assessment of sodium and ammonium lauryl sulfate. The data available for sodium lauryl sulfate and ammonium lauryl sulfate provide sufficient basis for concluding that sodium cetearyl sulfate and related alkyl sulfates are safe in the practices of use and concentration described in the safety assessment.

  4. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  5. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  6. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Degradation processes of reinforced concretes by combined sulfate–phosphate attack

    International Nuclear Information System (INIS)

    Secco, Michele; Lampronti, Giulio Isacco; Schlegel, Moritz-Caspar; Maritan, Lara; Zorzi, Federico

    2015-01-01

    A novel form of alteration due to the interaction between hydrated cement phases and sulfate and phosphate-based pollutants is described, through the characterization of concrete samples from an industrial reinforced concrete building. Decalcification of the cement matrices was observed, with secondary sulfate and phosphate-based mineral formation, according to a marked mineralogical and textural zoning. Five alteration layers may be detected: the two outermost layers are characterized by the presence of gypsum–brushite solid solution phases associated with anhydrous calcium sulfates and phosphates, respectively, while a progressive increase in apatite and ammonium magnesium phosphates is observable in the three innermost layers, associated with specific apatite precursors (brushite, octacalcium phosphate and amorphous calcium phosphate, respectively). The heterogeneous microstructural development of secondary phases is related to the chemical, pH and thermal gradients in the attacked cementitious systems, caused by different sources of pollutants and the exposure to the sun's radiation

  9. Degradation processes of reinforced concretes by combined sulfate–phosphate attack

    Energy Technology Data Exchange (ETDEWEB)

    Secco, Michele, E-mail: michele.secco@unipd.it [Inter-Departmental Research Center for the Study of Cement Materials and Hydraulic Binders (CIRCe), University of Padova, Via Gradenigo 6, 35131 Padova (Italy); Department of Civil, Environmental and Architectural Engineering (ICEA), University of Padova, Via Marzolo 9, 35131 Padova (Italy); Lampronti, Giulio Isacco, E-mail: gil21@cam.ac.uk [Department of Earth Sciences, University of Cambridge, Downing Street, CB2 3EQ Cambridge (United Kingdom); Schlegel, Moritz-Caspar, E-mail: moritz-caspar.schlegel@helmholtz-berlin.de [BAM Federal Institute for Materials Research and Testing, Unter den Eichen 87, 12205 Berlin (Germany); Helmholtz-Zentrum Berlin fürMaterialien und Energie GmbH, Hahn-Meitner-Platz 1, 14109 Berlin (Germany); Maritan, Lara, E-mail: lara.maritan@unipd.it [Department of Geosciences, University of Padova, Via Gradenigo 6, 35131 Padova (Italy); Zorzi, Federico, E-mail: federico.zorzi@unipd.it [Department of Geosciences, University of Padova, Via Gradenigo 6, 35131 Padova (Italy)

    2015-02-15

    A novel form of alteration due to the interaction between hydrated cement phases and sulfate and phosphate-based pollutants is described, through the characterization of concrete samples from an industrial reinforced concrete building. Decalcification of the cement matrices was observed, with secondary sulfate and phosphate-based mineral formation, according to a marked mineralogical and textural zoning. Five alteration layers may be detected: the two outermost layers are characterized by the presence of gypsum–brushite solid solution phases associated with anhydrous calcium sulfates and phosphates, respectively, while a progressive increase in apatite and ammonium magnesium phosphates is observable in the three innermost layers, associated with specific apatite precursors (brushite, octacalcium phosphate and amorphous calcium phosphate, respectively). The heterogeneous microstructural development of secondary phases is related to the chemical, pH and thermal gradients in the attacked cementitious systems, caused by different sources of pollutants and the exposure to the sun's radiation.

  10. Effect of sodium sulphate attack on the resistance to flexion, formation of expansive compounds and microcracking in cement paste; Efeito do ataque por sulfato de sodio na resistencia a flexao, formacao de compostos expansivos e microfissuracao de pastas de cimento

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Rui Barbosa de; John, Vanderlei Moacyr; Cincotto, Maria Alba [Universidade de Sao Paulo (USP), SP (Brazil). Escola Politecnica], e-mail: rui.souza@poli.usp.br, e-mail: vanderley.john@poli.usp.br, e-mail: maria.cincotto@poli.usp.br; Simao, Cristina Aiex [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia de Tecnologia e Engenharia de Poco], e-mail: caies@petrobras.com.br

    2008-06-15

    The main objective of this research is to study the common methods for evaluating cement reactivity to sulfate attack. Resistance to sulfate attack was measured by determining the flexural strength in cement paste samples with exposure to Na{sub 2}SO{sub 4} solution (45,426 ppm of SO{sub 4}{sup 2-}), at a high temperature (55 deg C). The results of flexural strength showed that the resistance increases due to the attack because the products fill the pores. (author)

  11. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  12. Chondroitin sulfate/dermatan sulfate sulfatases from mammals and bacteria.

    Science.gov (United States)

    Wang, Shumin; Sugahara, Kazuyuki; Li, Fuchuan

    2016-12-01

    Sulfatases that specifically catalyze the hydrolysis of the sulfate groups on chondroitin sulfate (CS)/dermatan sulfate (DS) poly- and oligosaccharides belong to the formylglycine-dependent family of sulfatases and have been widely found in various mammalian and bacterial organisms. However, only a few types of CS/DS sulfatase have been identified so far. Recently, several novel CS/DS sulfatases have been cloned and characterized. Advanced studies have provided significant insight into the biological function and mechanism of action of CS/DS sulfatases. Moreover, further studies will provide powerful tools for structural and functional studies of CS/DS as well as related applications. This article reviews the recent progress in CS/DS sulfatase research and is expected to initiate further research in this field.

  13. Semi-synthesis of chondroitin sulfate-E from chondroitin sulfate-A

    OpenAIRE

    Cai, Chao; Solakyildirim, Kemal; Yang, Bo; Beaudet, Julie M.; Weyer, Amanda; Linhardt, Robert J.; Zhang, Fuming

    2012-01-01

    Chondroitin sulfate-E (chondroitin-4, 6-disulfate) was prepared from chondroitin sulfate-A (chondroitin-4 - sulfate) by regioselective sulfonation, performed using trimethylamine sulfur trioxide in formamide under argon. The structure of semi-synthetic chondroitin sulfate-E was analyzed by PAGE, 1H NMR, 13C NMR, 2D NMR and disaccharide analysis and compared with natural chondroitin sulfate-E. Both semi-synthetic and natural chondroitin sulfate-E were each biotinylated and immobilized on BIAco...

  14. Chondroitin Sulfate Perlecan Enhances Collagen Fibril Formation

    DEFF Research Database (Denmark)

    Kvist, A. J.; Johnson, A. E.; Mörgelin, M.

    2006-01-01

    in collagen type II fibril assembly by perlecan-null chondrocytes. Cartilage perlecan is a heparin sulfate or a mixed heparan sulfate/chondroitin sulfate proteoglycan. The latter form binds collagen and accelerates fibril formation in vitro, with more defined fibril morphology and increased fibril diameters...... produced in the presence of perlecan. Interestingly, the enhancement of collagen fibril formation is independent on the core protein and is mimicked by chondroitin sulfate E but neither by chondroitin sulfate D nor dextran sulfate. Furthermore, perlecan chondroitin sulfate contains the 4,6-disulfated...... disaccharides typical for chondroitin sulfate E. Indeed, purified glycosaminoglycans from perlecan-enriched fractions of cartilage extracts contain elevated levels of 4,6-disulfated chondroitin sulfate disaccharides and enhance collagen fibril formation. The effect on collagen assembly is proportional...

  15. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  16. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  17. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  18. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  19. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  20. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  1. 49 CFR 193.2629 - External corrosion control: buried or submerged components.

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES: FEDERAL SAFETY STANDARDS Maintenance § 193.2629 External... external corrosive attack must be protected from external corrosion by— (1) Material that has been designed...

  2. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  3. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  4. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  5. Microbial fuel cell based on electroactive sulfate-reducing biofilm

    International Nuclear Information System (INIS)

    Angelov, Anatoliy; Bratkova, Svetlana; Loukanov, Alexandre

    2013-01-01

    Highlights: ► Regulation and management of electricity generation by variation of residence time. ► Design of microbial fuel cell based on electroactive biofilm on zeolite. ► Engineering solution for removing of the obtained elemental sulfur. - abstract: A two chambered laboratory scale microbial fuel cell (MFC) has been developed, based on natural sulfate-reducing bacterium consortium in electroactive biofilm on zeolite. The MFC utilizes potassium ferricyanide in the cathode chamber as an electron acceptor that derives electrons from the obtained in anode chamber H 2 S. The molecular oxygen is finally used as a terminal electron acceptor at cathode compartment. The generated power density was 0.68 W m −2 with current density of 3.2 A m −2 at 150 Ω electrode resistivity. The hydrogen sulfide itself is produced by microbial dissimilative sulfate reduction process by utilizing various organic substrates. Finally, elemental sulfur was identified as the predominant final oxidation product in the anode chamber. It was removed from MFC through medium circulation and gathering in an external tank. This report reveals dependence relationship between the progress of general electrochemical parameters and bacterial sulfate-reduction rate. The presented MFC design can be used for simultaneous sulfate purification of mining drainage wastewater and generation of renewable electricity

  6. Sulfate reduction in freshwater peatlands

    Energy Technology Data Exchange (ETDEWEB)

    Oequist, M.

    1996-12-31

    This text consist of two parts: Part A is a literature review on microbial sulfate reduction with emphasis on freshwater peatlands, and part B presents the results from a study of the relative importance of sulfate reduction and methane formation for the anaerobic decomposition in a boreal peatland. The relative importance of sulfate reduction and methane production for the anaerobic decomposition was studied in a small raised bog situated in the boreal zone of southern Sweden. Depth distribution of sulfate reduction- and methane production rates were measured in peat sampled from three sites (A, B, and C) forming an minerotrophic-ombrotrophic gradient. SO{sub 4}{sup 2-} concentrations in the three profiles were of equal magnitude and ranged from 50 to 150 {mu}M. In contrast, rates of sulfate reduction were vastly different: Maximum rates in the three profiles were obtained at a depth of ca. 20 cm below the water table. In A it was 8 {mu}M h{sup -1} while in B and C they were 1 and 0.05 {mu}M h{sup -1}, respectively. Methane production rates, however, were more uniform across the three nutrient regimes. Maximum rates in A (ca. 1.5 {mu}g d{sup -1} g{sup -1}) were found 10 cm below the water table, in B (ca. 1.0 {mu}g d{sup -1} g{sup -1}) in the vicinity of the water table, and in C (0.75 {mu}g d{sup -1} g{sup -1}) 20 cm below the water table. In all profiles both sulfate reduction and methane production rates were negligible above the water table. The areal estimates of methane production for the profiles were 22.4, 9.0 and 6.4 mmol m{sup -2} d{sup -1}, while the estimates for sulfate reduction were 26.4, 2.5, and 0.1 mmol m{sup -2} d{sup -1}, respectively. The calculated turnover times at the sites were 1.2, 14.2, and 198.7 days, respectively. The study shows that sulfate reducing bacteria are important for the anaerobic degradation in the studied peatland, especially in the minerotrophic sites, while methanogenic bacteria dominate in ombrotrophic sites Examination

  7. Sulfate reduction in freshwater peatlands

    International Nuclear Information System (INIS)

    Oequist, M.

    1996-01-01

    This text consist of two parts: Part A is a literature review on microbial sulfate reduction with emphasis on freshwater peatlands, and part B presents the results from a study of the relative importance of sulfate reduction and methane formation for the anaerobic decomposition in a boreal peatland. The relative importance of sulfate reduction and methane production for the anaerobic decomposition was studied in a small raised bog situated in the boreal zone of southern Sweden. Depth distribution of sulfate reduction- and methane production rates were measured in peat sampled from three sites (A, B, and C) forming an minerotrophic-ombrotrophic gradient. SO 4 2- concentrations in the three profiles were of equal magnitude and ranged from 50 to 150 μM. In contrast, rates of sulfate reduction were vastly different: Maximum rates in the three profiles were obtained at a depth of ca. 20 cm below the water table. In A it was 8 μM h -1 while in B and C they were 1 and 0.05 μM h -1 , respectively. Methane production rates, however, were more uniform across the three nutrient regimes. Maximum rates in A (ca. 1.5 μg d -1 g -1 ) were found 10 cm below the water table, in B (ca. 1.0 μg d -1 g -1 ) in the vicinity of the water table, and in C (0.75 μg d -1 g -1 ) 20 cm below the water table. In all profiles both sulfate reduction and methane production rates were negligible above the water table. The areal estimates of methane production for the profiles were 22.4, 9.0 and 6.4 mmol m -2 d -1 , while the estimates for sulfate reduction were 26.4, 2.5, and 0.1 mmol m -2 d -1 , respectively. The calculated turnover times at the sites were 1.2, 14.2, and 198.7 days, respectively. The study shows that sulfate reducing bacteria are important for the anaerobic degradation in the studied peatland, especially in the minerotrophic sites, while methanogenic bacteria dominate in ombrotrophic sites Examination paper. 67 refs, 6 figs, 3 tabs

  8. Acid Sulfate Alteration on Mars

    Science.gov (United States)

    Ming, D. W.; Morris, R. V.

    2016-01-01

    A variety of mineralogical and geochemical indicators for aqueous alteration on Mars have been identified by a combination of surface and orbital robotic missions, telescopic observations, characterization of Martian meteorites, and laboratory and terrestrial analog studies. Acid sulfate alteration has been identified at all three landing sites visited by NASA rover missions (Spirit, Opportunity, and Curiosity). Spirit landed in Gusev crater in 2004 and discovered Fe-sulfates and materials that have been extensively leached by acid sulfate solutions. Opportunity landing on the plains of Meridiani Planum also in 2004 where the rover encountered large abundances of jarosite and hematite in sedimentary rocks. Curiosity landed in Gale crater in 2012 and has characterized fluvial, deltaic, and lacustrine sediments. Jarosite and hematite were discovered in some of the lacustrine sediments. The high elemental abundance of sulfur in surface materials is obvious evidence that sulfate has played a major role in aqueous processes at all landing sites on Mars. The sulfate-rich outcrop at Meridiani Planum has an SO3 content of up to 25 wt.%. The interiors of rocks and outcrops on the Columbia Hills within Gusev crater have up to 8 wt.% SO3. Soils at both sites generally have between 5 to 14 wt.% SO3, and several soils in Gusev crater contain around 30 wt.% SO3. After normalization of major element compositions to a SO3-free basis, the bulk compositions of these materials are basaltic, with a few exceptions in Gusev crater and in lacustrine mudstones in Gale crater. These observations suggest that materials encountered by the rovers were derived from basaltic precursors by acid sulfate alteration under nearly isochemical conditions (i.e., minimal leaching). There are several cases, however, where acid sulfate alteration minerals (jarosite and hematite) formed in open hydrologic systems, e.g., in Gale crater lacustrine mudstones. Several hypotheses have been suggested for the

  9. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  10. Sulfate Transporters in Dissimilatory Sulfate Reducing Microorganisms: A Comparative Genomics Analysis

    Directory of Open Access Journals (Sweden)

    Angeliki Marietou

    2018-03-01

    Full Text Available The first step in the sulfate reduction pathway is the transport of sulfate across the cell membrane. This uptake has a major effect on sulfate reduction rates. Much of the information available on sulfate transport was obtained by studies on assimilatory sulfate reduction, where sulfate transporters were identified among several types of protein families. Despite our growing knowledge on the physiology of dissimilatory sulfate-reducing microorganisms (SRM there are no studies identifying the proteins involved in sulfate uptake in members of this ecologically important group of anaerobes. We surveyed the complete genomes of 44 sulfate-reducing bacteria and archaea across six phyla and identified putative sulfate transporter encoding genes from four out of the five surveyed protein families based on homology. We did not find evidence that ABC-type transporters (SulT are involved in the uptake of sulfate in SRM. We speculate that members of the CysP sulfate transporters could play a key role in the uptake of sulfate in thermophilic SRM. Putative CysZ-type sulfate transporters were present in all genomes examined suggesting that this overlooked group of sulfate transporters might play a role in sulfate transport in dissimilatory sulfate reducers alongside SulP. Our in silico analysis highlights several targets for further molecular studies in order to understand this key step in the metabolism of SRMs.

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    . Antennas are an integral part of wireless networks. A selected antenna type affects performance, network availability and safety of wireless networks. Finding default values CommView for WiFi is a tool for monitoring data flow (sniffer especially written for wireless networks. Cain & Abel is a universal tool for the detection of all types of passwords. If a wireless network uses a protective mechanism of MAC address filtering, then the attacker must collect the IP addresses. To connect to a wireless access point, it is necessary to know its SSID. Contrary to what some people think, SSID is not a password. Wardriving Driving a car with a portable computer aimed at the detection of wireless computer networks, onto which connection is later possible, is called wardriving. For wardriving, it is necessary to have an appropriate software tool and a wireless network card or an adapter, on which an external antenna can be added to increase signal strength. It is also possible to use a global positioning device (GPS to determine the coordinates of the detected wireless access points on a map. The most widely used software tools for wardriving are Network Stumbler, Kismet and MiniStumbler. Network attacks Hackers’ most usual attack to circumvent the basic access control in wireless networks is masking their own MAC address with an MAC address of a legitimate client on the network (MAC address spoofing. Man-in-the-Middle attack inserts the attacker’s system in the middle between wireless clients and the wireless access point. Legitimate wireless users will be fooled when they try to connect, by being associated to the attacker's system instead of the legitimate wireless access point. The ARP table poisoning attack inserts the attacker's system in the middle of communication between legitimate clients and the wireless access point. Attackers could use the address resolution protocol if it is running on the network. The aim of this attack is to introduce an attacker as a legitimate

  12. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  13. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  14. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  15. Sulfate transport in toad skin

    DEFF Research Database (Denmark)

    Larsen, Erik Hviid; Simonsen, K

    1988-01-01

    1. In short-circuited toad skin preparations exposed bilaterally to NaCl-Ringer's containing 1 mM SO2(-4), influx of sulfate was larger than efflux showing that the skin is capable of transporting sulfate actively in an inward direction. 2. This active transport was not abolished by substituting...... apical Na+ for K+. 3. Following voltage activation of the passive Cl- permeability of the mitochondria-rich (m.r.) cells sulfate flux-ratio increased to a value predicted from the Ussing flux-ratio equation for a monovalent anion. 4. In such skins, which were shown to exhibit vanishingly small leakage...... conductances, the variation of the rate coefficient for sulfate influx (y) was positively correlated with the rate coefficient for Cl- influx (x), y = 0.035 x - 0.0077 cm/sec (r = 0.9935, n = 15). 5. Addition of the phosphodiesterase inhibitor, 3-isobutyl-1-methyl-xanthine to the serosal bath of short...

  16. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  17. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  18. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  19. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  20. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  1. Electrogenic sulfate uptake by crustacean hepatopancreatic basolateral membrane vesicles

    International Nuclear Information System (INIS)

    Cattey, M.A.; Gerencser, G.A.; Aheam, G.A.

    1990-01-01

    Basolateral membrane vesicles (BLMV) were isolated from Atlantic lobster (Homarus americanus) hepatopancreas and purified by discontinuous sucrose gradient centrifugation. BLMV prepared in this fashion were osmotically reactive exhibiting linear dependence of vesicular 35 SO 4 -2 uptake to increasing external osmotic pressure with negligible non-specific isotope binding. Under short circuited conditions (valinomycin/K + ) BLMV responded to either a HCO 3 - gradient directed out or equilibrated HCO 3 - (10 mM) by displaying short term accumulation of sulfate above that of equilibrium. Uptake of divalent anion was unaffected by an inwardly directed transmembrane Na + or tetramethylammonium + gradient. 35 SO 4 -2 /HCO 3 - exchange in the presence of valinomycin was stimulated by transient inside positive K + diffusion potentials and inhibited by transient inside negative K + diffusion potentials. The role of electrogenic anion exchange by hepatopancreas BLMV in transcellular sulfate transport is discussed

  2. 21 CFR 184.1261 - Copper sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Copper sulfate. 184.1261 Section 184.1261 Food and... Substances Affirmed as GRAS § 184.1261 Copper sulfate. (a) Copper sulfate (cupric sulfate, CuSO4·5H2O, CAS... the reaction of sulfuric acid with cupric oxide or with copper metal. (b) The ingredient must be of a...

  3. Periodate Oxidation for Sulfated Glycosaminoglycans, with Special Reference to the Position of Extra Sulfate Groups in Chondroitin Polysulfates, Chondroitin Sulfate D and Chondroitin Sulfate K

    OpenAIRE

    Seno, Nobuko; Murakami, Keiko; Shibusawa, Haru

    1981-01-01

    The optimum conditions for periodate oxidation of sulfated disaccharides were investigated to determine the position of extra sulfate groups on the saturated disulfated disaccharides obtained from chondroitin polysulfates, chondroitin sulfates D and K. Under the conditions: 2mM saturated disulfated disaccharide with 20mM sodium periodate at 37°in the dark, the uronic acid residue in the disulfated disaccharide from chondroitin sulfate D was rapidly and completely destroyed, whereas that in th...

  4. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  5. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  6. 21 CFR 582.5230 - Calcium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Calcium sulfate. 582.5230 Section 582.5230 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Supplements 1 § 582.5230 Calcium sulfate. (a) Product. Calcium sulfate. (b) Conditions of use. This substance...

  7. 21 CFR 184.1643 - Potassium sulfate.

    Science.gov (United States)

    2010-04-01

    ... hydroxide or potassium carbonate. (b) The ingredient meets the specifications of the “Food Chemicals Codex... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Potassium sulfate. 184.1643 Section 184.1643 Food... Specific Substances Affirmed as GRAS § 184.1643 Potassium sulfate. (a) Potassium sulfate (K2SO4, CAS Reg...

  8. 21 CFR 184.1443 - Magnesium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Magnesium sulfate. 184.1443 Section 184.1443 Food... Specific Substances Affirmed as GRAS § 184.1443 Magnesium sulfate. (a) Magnesium sulfate (MgSO4·7H2O, CAS... magnesium oxide, hydroxide, or carbonate with sulfuric acid and evaporating the solution to crystallization...

  9. EFFECT OF MAGNESIUM SULFATE (A LAXATIVE) ON ...

    African Journals Online (AJOL)

    use with little success . Magnesium sulfate also known as Epsom salt or bitter salt is a hydrate salt with a chemical name of magnesium sulfate heptahydrate . Chemical formula is MgSO. 7HO and trade name is. Andrews liver salt. Dried magnesium sulfate is an osmotic laxative or a saline laxative that acts by increasing the.

  10. 21 CFR 582.5443 - Magnesium sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Magnesium sulfate. 582.5443 Section 582.5443 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Supplements 1 § 582.5443 Magnesium sulfate. (a) Product. Magnesium sulfate. (b) Conditions of use. This...

  11. Modeling and minimization of barium sulfate scale

    Science.gov (United States)

    Alan W. Rudie; Peter W. Hart

    2006-01-01

    The majority of the barium present in the pulping process exits the digester as barium carbonate. Barium carbonate dissolves in the bleach plant when the pH drops below 7 and, if barium and sulfate concentrations are too high, begins to precipitate as barium sulfate. Barium is difficult to control because a mill cannot avoid this carbonate-to-sulfate transition using...

  12. 21 CFR 582.1125 - Aluminum sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Aluminum sulfate. 582.1125 Section 582.1125 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL... Additives § 582.1125 Aluminum sulfate. (a) Product. Aluminum sulfate. (b) Conditions of use. This substance...

  13. 21 CFR 182.1125 - Aluminum sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Aluminum sulfate. 182.1125 Section 182.1125 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR... Substances § 182.1125 Aluminum sulfate. (a) Product. Aluminum sulfate. (b) Conditions of use. This substance...

  14. Salt Attack on Rocks and Expansion of Soils on Mars

    Science.gov (United States)

    Vaniman, D. T.; Bish, D. L.; Chipera, S. J.; Carey, J. W.

    2004-12-01

    Salt-rich sediments observed by the MER rover Opportunity at Meridiani Planum show that brines have been present on Mars in the past, but a role for groundwater in widespread rock weathering and soil formation is uncertain. Experiments by several groups suggest instead the action of acid fog over long time spans, with episodic input of volcanic gases, as a more significant agent of Mars weathering. Salt minerals formed in these acid weathering experiments consistently include gypsum and alunogen, with epsomite or hexahydrite forming where olivine provides a source of Mg. Analogous to the martian acid fog scenario are terrestrial acid rain or acid fog attacks on building and monument stone by chemical action and mechanical wedging through growth of gypsum, anhydrite, epsomite, hexahydrite, kieserite, and other sulfate minerals. Physical effects can be aggressive, operating by both primary salt growth and hydration of anhydrous or less-hydrous primary salts. In contrast, soils evolve to states where chemical attack is lessened and salt mineral growth leads to expansion with cementation; in this situation the process becomes constructive rather than destructive. We have made synthetic salt-cemented soils (duricrusts) from clays, zeolites, palagonites and other media mixed with ultrapure Mg-sulfate solutions. Although near-neutral in pH, these solutions still exchange or leach Ca from the solids to form cements containing gypsum as well as hexahydrite. At low total P (1 torr) and low RH (duricrust expands by formation of a complex mixture of Mg-sulfate phases with various hydration states. The expanded form is retained even if the duricrust is again dehydrated, suggesting that soil porosity thus formed is difficult to destroy. These processes can be considered in the context of Viking, Pathfinder, and MER evidence for differing salt components in the weathered surfaces of rocks versus duricrust-like materials in soils. The divergent chemical trends indicate that soil

  15. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  16. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  17. durability of natural pozzolan-based mortar exposed to sulfate attack

    African Journals Online (AJOL)

    Laoufi L, Senhadji Y, Benazzouk A, Langlet T, Mouli M and Laoufi I

    1 mai 2016 ... CaO SiO2 Al2O3 Fe2O3 SO3 K2O Na2O MgO RI PAF. 63,89 21,4 4,59 5,52 2,72 0,41 0,13 1,37 0,22 2,47. RI : Résidu insoluble, PAF : Perte au feu. 2.1.2. La Pouzzolane Naturelle. Après un séchage de 105°C pour éliminer l'eau libre, la pouzzolane a été broyée finement. Les propriétés physiques et la ...

  18. Durability of natural pozzolan-based mortar exposed to sulfate attack

    African Journals Online (AJOL)

    Cement is a strategic commodity in the civil engineering for the construction of reinforced concrete structures. But its production generates around 5% of toxic gases such as CO2 responsible for environmental degradation. Furthermore, cement industry is a consumer sector of non-renewable energy. The use in the cement ...

  19. Regeneration of sulfated metal oxides and carbonates

    Science.gov (United States)

    Hubble, Bill R.; Siegel, Stanley; Cunningham, Paul T.

    1978-03-28

    Alkali metal or alkaline earth metal carbonates such as calcium carbonate and magnesium carbonate found in dolomite or limestone are employed for removal of sulfur dioxide from combustion exhaust gases. The sulfated carbonates are regenerated to oxides through use of a solid-solid reaction, particularly calcium sulfide with calcium sulfate to form calcium oxide and sulfur dioxide gas. The regeneration is performed by contacting the sulfated material with a reductant gas such as hydrogen within an inert diluent to produce calcium sulfide in mixture with the sulfate under process conditions selected to permit the sulfide-sulfate, solid-state reaction to occur.

  20. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  1. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  2. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  3. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  4. Reduced sulfation of chondroitin sulfate but not heparan sulfate in kidneys of diabetic db/db mice.

    Science.gov (United States)

    Reine, Trine M; Grøndahl, Frøy; Jenssen, Trond G; Hadler-Olsen, Elin; Prydz, Kristian; Kolset, Svein O

    2013-08-01

    Heparan sulfate proteoglycans are hypothesized to contribute to the filtration barrier in kidney glomeruli and the glycocalyx of endothelial cells. To investigate potential changes in proteoglycans in diabetic kidney, we isolated glycosaminoglycans from kidney cortex from healthy db/+ and diabetic db/db mice. Disaccharide analysis of chondroitin sulfate revealed a significant decrease in the 4-O-sulfated disaccharides (D0a4) from 65% to 40%, whereas 6-O-sulfated disaccharides (D0a6) were reduced from 11% to 6%, with a corresponding increase in unsulfated disaccharides. In contrast, no structural differences were observed in heparan sulfate. Furthermore, no difference was found in the molar amount of glycosaminoglycans, or in the ratio of hyaluronan/heparan sulfate/chondroitin sulfate. Immunohistochemical staining for the heparan sulfate proteoglycan perlecan was similar in both types of material but reduced staining of 4-O-sulfated chondroitin and dermatan was observed in kidney sections from diabetic mice. In support of this, using qRT-PCR, a 53.5% decrease in the expression level of Chst-11 (chondroitin 4-O sulfotransferase) was demonstrated in diabetic kidney. These results suggest that changes in the sulfation of chondroitin need to be addressed in future studies on proteoglycans and kidney function in diabetes.

  5. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  6. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Modeling of ferric sulfate decomposition and sulfation of potassium chloride during grate‐firing of biomass

    DEFF Research Database (Denmark)

    Wu, Hao; Jespersen, Jacob Boll; Jappe Frandsen, Flemming

    2013-01-01

    Ferric sulfate is used as an additive in biomass combustion to convert the released potassium chloride to the less harmful potassium sulfate. The decomposition of ferric sulfate is studied in a fast heating rate thermogravimetric analyzer and a volumetric reaction model is proposed to describe...... the process. The yields of sulfur oxides from ferric sulfate decomposition under boiler conditions are investigated experimentally, revealing a distribution of approximately 40% SO3 and 60% SO2. The ferric sulfate decomposition model is combined with a detailed kinetic model of gas‐phase KCl sulfation...... and a model of K2SO4 condensation to simulate the sulfation of KCl by ferric sulfate addition. The simulation results show good agreements with experiments conducted in a biomass grate‐firing reactor. The results indicate that the SO3 released from ferric sulfate decomposition is the main contributor to KCl...

  13. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  14. Amn al-Kharji: An Analysis of External Operations Wing of the Islamic State

    Directory of Open Access Journals (Sweden)

    Jakub Rafay

    2017-06-01

    Full Text Available This article provides an analysis of the external operations wing of IS –the so-called Amn al-Kharji – focusing on its activities in the West. Apart from describing the organisation’s leadership, internal hierarchy, strategy and means of communication and attack coordination, the author asserts there is a link between recent deadly cells-based attacks and generally unsuccessful lone actor attacks; this connection between the two is not accidental but a result of a grand strategy, designed to hide the planning of larger plots by overloading security services with numerous smaller attacks.

  15. Inhibition of synthesis of heparan sulfate by selenate: Possible dependence on sulfation for chain polymerization

    International Nuclear Information System (INIS)

    Dietrich, C.P.; Nader, H.B.; Buonassisi, V.; Colburn, P.

    1988-01-01

    Selenate, a sulfation inhibitor, blocks the synthesis of heparan sulfate and chondroitin sulfate by cultured endothelial cells. In contrast, selenate does not affect the production of hyaluronic acid, a nonsulfated glycosaminoglycan. No differences in molecular weight, [ 3 H]glucosamine/[ 35 S]sulfuric acid ratios, or disaccharide composition were observed when the heparan sulfate synthesized by selenate-treated cells was compared with that of control cells. The absence of undersulfated chains in preparations from cultures exposed to selenate supports the concept that, in the intact cell, the polymerization of heparan sulfate might be dependent on the sulfation of the saccharide units added to the growing glycosaminoglycan chain

  16. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  17. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  18. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  19. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  20. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  1. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  2. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  3. Analysis of tyrosine-O-sulfation

    DEFF Research Database (Denmark)

    Bundgaard, J.R.; Sen, J.W.; Johnsen, A.H.

    2008-01-01

    Tyrosine O-sulfation was first described about 50 years ago as a post-translational modification of fibrinogen. In the following 30 years it was considered to be a rare modification affecting only a few proteins and peptides. However, in the beginning of the 1980s tyrosine (Tyr) sulfation was shown...... to be a common modification and since then an increasing number of proteins have been identified as sulfated. The target proteins belong to the classes of secretory, plasma membrane, and lysosomal proteins, which reflects the intracellular localization of the enzymes catalyzing Tyr sulfation, the tyrosylprotein...... sulfotransferases (TPSTs).Traditionally, Tyr sulfation has been analyzed by incorporation of radiolabeled sulfate into target cells followed by purification of the target protein. Subsequently, the protein is degraded enzymatically or by alkaline hydrolysis followed by thin-layer electrophoresis to demonstrate...

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  6. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  7. Regulating multiple externalities

    DEFF Research Database (Denmark)

    Waldo, Staffan; Jensen, Frank; Nielsen, Max

    2016-01-01

    Open access is a well-known externality problem in fisheries causing excess capacity and overfishing. Due to global warming, externality problems from CO2 emissions have gained increased interest. With two externality problems, a first-best optimum can be achieved by using two regulatory instrume......Open access is a well-known externality problem in fisheries causing excess capacity and overfishing. Due to global warming, externality problems from CO2 emissions have gained increased interest. With two externality problems, a first-best optimum can be achieved by using two regulatory...

  8. Bactericide for sulfate-reducing bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Shklyar, T F; Anoshina, G M; Blokhin, V Ye; Kisarrev, Ye L; Novikovsa, G M

    1981-01-01

    The aim of the invention is to find a bactericide for sulfate-reducing bacteria of oil fields in Western Siberia in order to suppress the biocorrosive activity on oil industry equipment. This goal is achieved by using M-nitroacetanylide as the bactericide of sulfate-reducing bacteria. This agent suppresses the activity of a stored culture of sulfate-reducing bacteria that comes from industrial waste waters injection wells of the Smotlor oil field.

  9. ExternE National Implementation Finland

    Energy Technology Data Exchange (ETDEWEB)

    Pingoud, K; Maelkki, H; Wihersaari, M; Pirilae, P [VTT Energy, Espoo (Finland); Hongisto, M [Imatran Voima Oy, Vantaa (Finland); Siitonen, S [Ekono Energy Ltd, Espoo (Finland); Johansson, M [Finnish Environment Institute, Helsinki (Finland)

    1999-07-01

    ExternE National Implementation is a continuation of the ExternE Project, funded in part by the European Commission's Joule III Programme. This study is the result of the ExternE National Implementation Project for Finland. Three fuel cycles were selected for the Finnish study: coal, peat and wood-derived biomass, which together are responsible for about 40% of total electricity generation in Finland and about 75% of the non-nuclear fuel based generation. The estimated external costs or damages were dominated by the global warming (GW) impacts in the coal and peat fuel cycles, but knowledge of the true GW impacts is still uncertain. From among other impacts that were valued in monetary terms the human health damages due to airborne emissions dominated in all the three fuel cycles. Monetary valuation for ecosystem impacts is not possible using the ExternE methodology at present. The Meri-Pori power station representing the coal fuel cycle is one of the world's cleanest and most efficient coal-fired power plants with a condensing turbine. The coal is imported mainly from Poland. The estimated health damages were about 4 mECU/kWh, crop damages an order of magnitude lower and damages caused to building materials two orders of magnitude lower. The power stations of the peat and biomass fuel cycles are of CHP type, generating electricity and heat for the district heating systems of two cities. Their fuels are of domestic origin. The estimated health damages allocated to electricity generation were about 5 and 6 mECU/kWh, respectively. The estimates were case-specific and thus an generalisation of the results to the whole electricity generation in Finland is unrealistic. Despite the uncertainties and limitations of the methodology, it is a promising tool in the comparison of similar kinds of fuel cycles, new power plants and pollution abatement technologies and different plant locations with each other. (orig.)

  10. ExternE National Implementation Finland

    International Nuclear Information System (INIS)

    Pingoud, K.; Maelkki, H.; Wihersaari, M.; Pirilae, P.; Hongisto, M.; Siitonen, S.; Johansson, M.

    1999-01-01

    ExternE National Implementation is a continuation of the ExternE Project, funded in part by the European Commission's Joule III Programme. This study is the result of the ExternE National Implementation Project for Finland. Three fuel cycles were selected for the Finnish study: coal, peat and wood-derived biomass, which together are responsible for about 40% of total electricity generation in Finland and about 75% of the non-nuclear fuel based generation. The estimated external costs or damages were dominated by the global warming (GW) impacts in the coal and peat fuel cycles, but knowledge of the true GW impacts is still uncertain. From among other impacts that were valued in monetary terms the human health damages due to airborne emissions dominated in all the three fuel cycles. Monetary valuation for ecosystem impacts is not possible using the ExternE methodology at present. The Meri-Pori power station representing the coal fuel cycle is one of the world's cleanest and most efficient coal-fired power plants with a condensing turbine. The coal is imported mainly from Poland. The estimated health damages were about 4 mECU/kWh, crop damages an order of magnitude lower and damages caused to building materials two orders of magnitude lower. The power stations of the peat and biomass fuel cycles are of CHP type, generating electricity and heat for the district heating systems of two cities. Their fuels are of domestic origin. The estimated health damages allocated to electricity generation were about 5 and 6 mECU/kWh, respectively. The estimates were case-specific and thus an generalisation of the results to the whole electricity generation in Finland is unrealistic. Despite the uncertainties and limitations of the methodology, it is a promising tool in the comparison of similar kinds of fuel cycles, new power plants and pollution abatement technologies and different plant locations with each other. (orig.)

  11. ExternE National Implementation Finland

    Energy Technology Data Exchange (ETDEWEB)

    Pingoud, K.; Maelkki, H.; Wihersaari, M.; Pirilae, P. [VTT Energy, Espoo (Finland); Hongisto, M. [Imatran Voima Oy, Vantaa (Finland); Siitonen, S. [Ekono Energy Ltd, Espoo (Finland); Johansson, M. [Finnish Environment Institute, Helsinki (Finland)

    1999-07-01

    ExternE National Implementation is a continuation of the ExternE Project, funded in part by the European Commission's Joule III Programme. This study is the result of the ExternE National Implementation Project for Finland. Three fuel cycles were selected for the Finnish study: coal, peat and wood-derived biomass, which together are responsible for about 40% of total electricity generation in Finland and about 75% of the non-nuclear fuel based generation. The estimated external costs or damages were dominated by the global warming (GW) impacts in the coal and peat fuel cycles, but knowledge of the true GW impacts is still uncertain. From among other impacts that were valued in monetary terms the human health damages due to airborne emissions dominated in all the three fuel cycles. Monetary valuation for ecosystem impacts is not possible using the ExternE methodology at present. The Meri-Pori power station representing the coal fuel cycle is one of the world's cleanest and most efficient coal-fired power plants with a condensing turbine. The coal is imported mainly from Poland. The estimated health damages were about 4 mECU/kWh, crop damages an order of magnitude lower and damages caused to building materials two orders of magnitude lower. The power stations of the peat and biomass fuel cycles are of CHP type, generating electricity and heat for the district heating systems of two cities. Their fuels are of domestic origin. The estimated health damages allocated to electricity generation were about 5 and 6 mECU/kWh, respectively. The estimates were case-specific and thus an generalisation of the results to the whole electricity generation in Finland is unrealistic. Despite the uncertainties and limitations of the methodology, it is a promising tool in the comparison of similar kinds of fuel cycles, new power plants and pollution abatement technologies and different plant locations with each other. (orig.)

  12. Significant role of organic sulfur in supporting sedimentary sulfate reduction in low-sulfate environments

    Science.gov (United States)

    Fakhraee, Mojtaba; Li, Jiying; Katsev, Sergei

    2017-09-01

    Dissimilatory sulfate reduction (DSR) is a major carbon mineralization pathway in aquatic sediments, soils, and groundwater, which regulates the production of hydrogen sulfide and the mobilization rates of biologically important elements such as phosphorus and mercury. It has been widely assumed that water-column sulfate is the main sulfur source to fuel this reaction in sediments. While this assumption may be justified in high-sulfate environments such as modern seawater, we argue that in low-sulfate environments mineralization of organic sulfur compounds can be an important source of sulfate. Using a reaction-transport model, we investigate the production of sulfate from sulfur-containing organic matter for a range of environments. The results show that in low sulfate environments (50%) of sulfate reduction. In well-oxygenated systems, porewater sulfate profiles often exhibit sub-interface peaks so that sulfate fluxes are directed out of the sediment. Our measurements in Lake Superior, the world's largest lake, corroborate this conclusion: offshore sediments act as sources rather than sinks of sulfate for the water column, and sediment DSR is supported entirely by the in-sediment production of sulfate. Sulfate reduction rates are correlated to the depth of oxygen penetration and strongly regulated by the supply of reactive organic matter; rate co-regulation by sulfate availability becomes appreciable below 500 μM level. The results indicate the need to consider the mineralization of organic sulfur in the biogeochemical cycling in low-sulfate environments, including several of the world's largest freshwater bodies, deep subsurface, and possibly the sulfate-poor oceans of the Early Earth.

  13. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  14. The influence of different black carbon and sulfate mixing methods on their optical and radiative properties

    Science.gov (United States)

    Zhang, Hua; Zhou, Chen; Wang, Zhili; Zhao, Shuyun; Li, Jiangnan

    2015-08-01

    Three different internal mixing methods (Core-Shell, Maxwell-Garnett, and Bruggeman) and one external mixing method are used to study the impact of mixing methods of black carbon (BC) with sulfate aerosol on their optical properties, radiative flux, and heating rate. The optical properties of a mixture of BC and sulfate aerosol particles are considered for three typical bands. The results show that mixing methods, the volume ratio of BC to sulfate, and relative humidity have a strong influence on the optical properties of mixed aerosols. Compared to internal mixing, external mixing underestimates the particle mass absorption coefficient by 20-70% and the particle mass scattering coefficient by up to 50%, whereas it overestimates the particle single scattering albedo by 20-50% in most cases. However, the asymmetry parameter is strongly sensitive to the equivalent particle radius, but is only weakly sensitive to the different mixing methods. Of the internal methods, there is less than 2% difference in all optical properties between the Maxwell-Garnett and Bruggeman methods in all bands; however, the differences between the Core-Shell and Maxwell-Garnett/Bruggeman methods are usually larger than 15% in the ultraviolet and visible bands. A sensitivity test is conducted with the Beijing Climate Center Radiation transfer model (BCC-RAD) using a simulated BC concentration that is typical of east-central China and a sulfate volume ratio of 75%. The results show that the internal mixing methods could reduce the radiative flux more effectively because they produce a higher absorption. The annual mean instantaneous radiative force due to BC-sulfate aerosol is about -3.18 W/m2 for the external method and -6.91 W/m2 for the internal methods at the surface, and -3.03/-1.56/-1.85 W/m2 for the external/Core-Shell/(Maxwell-Garnett/Bruggeman) methods, respectively, at the tropopause.

  15. External Otitis (Swimmer's Ear)

    Science.gov (United States)

    ... otitis. Fungal external otitis (otomycosis), typically caused by Aspergillus niger or Candida albicans, is less common. Boils are ... in the ear. Fungal external otitis caused by Aspergillus niger usually causes grayish black or yellow dots (called ...

  16. ExternE: Externalities of energy Vol. 2. Methodology

    International Nuclear Information System (INIS)

    Berry, J.; Holland, M.; Watkiss, P.

    1995-01-01

    This report describes the methodology used by the ExternE Project of the European Commission (DGXII) JOULE Programme for assessment of the external costs of energy. It is one of a series of reports describing analysis of nuclear, fossil and renewable fuel cycles for assessment of the externalities associated with electricity generation. Part I of the report deals with analysis of impacts, and Part II with the economic valuation of those impacts. Analysis is conducted on a marginal basis, to allow the effect of an incremental investment in a given technology to be quantified. Attention has been paid to the specificity of results with respect to the location of fuel cycle activities, the precise technologies used, and the type and source of fuel. The main advantages of this detailed approach are as follows: It takes full and proper account of the variability of impacts that might result from different power projects; It is more transparent than analysis based on hypothetically 'representative' cases for each of the different fuel cycles; It provides a framework for consistent comparison between fuel cycles. A wide variety of impacts have been considered. These include the effects of air pollution on the natural and human environment, consequences of accidents in the workplace, impacts of noise and visual intrusion on amenity, and the effects of climate change arising from the release of greenhouse gases. Wherever possible we have used the 'impact pathway' or 'damage function' approach to follow the analysis from identification of burdens (e.g. emissions) through to impact assessment and then valuation in monetary terms. This has required a detailed knowledge of the technologies involved, pollutant dispersion, analysis of effects on human and environmental health, and economics. In view of this the project brought together a multi-disciplinary team with experts from many European countries and the USA. The spatial and temporal ranges considered in the analysis are

  17. ASH External Web Portal (External Portal) -

    Data.gov (United States)

    Department of Transportation — The ASH External Web Portal is a web-based portal that provides single sign-on functionality, making the web portal a single location from which to be authenticated...

  18. Discovery of a Heparan sulfate 3- o -sulfation specific peeling reaction

    NARCIS (Netherlands)

    Huang, Yu; Mao, Yang; Zong, Chengli; Lin, Cheng; Boons, Geert Jan|info:eu-repo/dai/nl/088245489; Zaia, Joseph

    2015-01-01

    Heparan sulfate (HS) 3-O-sulfation determines the binding specificity of HS/heparin for antithrombin III and plays a key role in herpes simplex virus (HSV) infection. However, the low natural abundance of HS 3-O-sulfation poses a serious challenge for functional studies other than the two cases

  19. 21 CFR 172.822 - Sodium lauryl sulfate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Sodium lauryl sulfate. 172.822 Section 172.822 Food... Multipurpose Additives § 172.822 Sodium lauryl sulfate. The food additive sodium lauryl sulfate may be safely... specifications: (1) It is a mixture of sodium alkyl sulfates consisting chiefly of sodium lauryl sulfate [CH2(CH2...

  20. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  1. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  2. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  3. Brittlestars contain highly sulfated chondroitin sulfates/dermatan sulfates that promote fibroblast growth factor 2-induced cell signaling.

    Science.gov (United States)

    Ramachandra, Rashmi; Namburi, Ramesh B; Ortega-Martinez, Olga; Shi, Xiaofeng; Zaia, Joseph; Dupont, Sam T; Thorndyke, Michael C; Lindahl, Ulf; Spillmann, Dorothe

    2014-02-01

    Glycosaminoglycans (GAGs) isolated from brittlestars, Echinodermata class Ophiuroidea, were characterized, as part of attempts to understand the evolutionary development of these polysaccharides. A population of chondroitin sulfate/dermatan sulfate (CS/DS) chains with a high overall degree of sulfation and hexuronate epimerization was the major GAG found, whereas heparan sulfate (HS) was below detection level. Enzymatic digestion with different chondroitin lyases revealed exceptionally high proportions of di- and trisulfated CS/DS disaccharides. The latter unit appears much more abundant in one of four individual species of brittlestars, Amphiura filiformis, than reported earlier in other marine invertebrates. The brittlestar CS/DS was further shown to bind to growth factors such as fibroblast growth factor 2 and to promote FGF-stimulated cell signaling in GAG-deficient cell lines in a manner similar to that of heparin. These findings point to a potential biological role for the highly sulfated invertebrate GAGs, similar to those ascribed to HS in vertebrates.

  4. Influence of sulfates on chloride diffusion and chloride-induced reinforcement corrosion in limestone cement materials at low temperature

    Czech Academy of Sciences Publication Activity Database

    Sotiriadis, Konstantinos; Rakanta, E.; Mitzithra, M. E.; Batis, G.; Tsivilis, S.

    2017-01-01

    Roč. 29, č. 8 (2017), č. článku 04017060. ISSN 0899-1561 R&D Projects: GA MŠk(CZ) LO1219 Keywords : limestone cement * chloride diffusion * reinforcement corrosion * sulfate attack * low temperature Subject RIV: JN - Civil Engineering OBOR OECD: Composites (including laminates, reinforced plastics, cermets, combined natural and synthetic fibre fabrics Impact factor: 1.644, year: 2016 http://ascelibrary.org/doi/abs/10.1061/%28ASCE%29MT.1943-5533.0001895

  5. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  6. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  7. Shoulder-Rotator Strength, Range of Motion, and Acromiohumeral Distance in Asymptomatic Adolescent Volleyball Attackers.

    Science.gov (United States)

    Harput, Gulcan; Guney, Hande; Toprak, Ugur; Kaya, Tunca; Colakoglu, Fatma Filiz; Baltaci, Gul

    2016-09-01

    Sport-specific adaptations at the glenohumeral joint could occur in adolescent athletes because they start participating in high-performance sports in early childhood. To investigate shoulder-rotator strength, internal-rotation (IR) and external-rotation (ER) range of motion (ROM), and acromiohumeral distance (AHD) in asymptomatic adolescent volleyball attackers to determine if they have risk factors for injury. Cross-sectional study. University laboratory. Thirty-nine adolescent high school-aged volleyball attackers (22 boys, 17 girls; age = 16.0 ± 1.4 years, height = 179.2 ± 9.0 cm, mass = 67.1 ± 10.9 kg, body mass index = 20.7 ± 2.6 kg/m 2 ). Shoulder IR and ER ROM, total-rotation ROM, glenohumeral IR deficit, AHD, and concentric and eccentric strength of the shoulder internal and external rotators were tested bilaterally. External-rotation ROM was greater (t 38 = 4.92, P 18°). We observed greater concentric internal-rotator (t 38 = 2.89, P = .006) and eccentric external-rotator (t 38 = 2.65, P = .01) strength in the dominant than in the nondominant shoulder. The AHD was less in the dominant shoulder (t 38 = -3.60, P volleyball attackers demonstrated decreased IR ROM, total ROM, and AHD and increased ER ROM in their dominant shoulder. Therefore, routine screening of adolescent athletes and designing training programs for hazardous adaptive changes could be important in preventing shoulder injuries.

  8. Speculative attacks, openness and crises

    Directory of Open Access Journals (Sweden)

    Aloisio Araujo

    2012-06-01

    Full Text Available We extended the Cole and Kehoe model (1996 by adding trade and debt denominated in national currency. We then evaluated some external debt defaults and steep national currency devaluations occurred during last decades. Although default is unlikely, steep devaluation has been repeatedly triggered during financial distresses. It helps to overcome financial crisis as it improves trade balance and reduces national debt level. On the other hand, expected devaluation hurts welfare through both higher national debt cost and reductions in the investment level. We modeled such trade-offs and showed that trade openness, by and large, improves the expected welfare as it allows for a better devaluation-response technology. We ran model simulations based on past 48 crises occurred in 32 middle-income countries, reasonably fitting devaluation and default responses observed as from 1971.

  9. The anaerobic treatment of sulfate containing wastewater

    NARCIS (Netherlands)

    Visser, A.

    1995-01-01


    In the anaerobic treatment of sulfate containing wastewater sulfate reducing bacteria (SRB) will compete with methanogenic- (MB) and acetogenic bacteria (AB) for the available substrates such as hydrogen, acetate, propionate and butyrate. The outcome of this competition will

  10. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  11. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  14. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  15. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  16. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  17. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  18. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  19. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  20. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  1. Synthesis of the oligosaccharides related to branching sites of fucosylated chondroitin sulfates from sea cucumbers.

    Science.gov (United States)

    Ustyuzhanina, Nadezhda E; Fomitskaya, Polina A; Gerbst, Alexey G; Dmitrenok, Andrey S; Nifantiev, Nikolay E

    2015-02-02

    Natural anionic polysaccharides fucosylated chondroitin sulfates (FCS) from sea cucumbers attract great attention nowadays due to their ability to influence various biological processes, such as blood coagulation, thrombosis, angiogenesis, inflammation, bacterial and viral adhesion. To determine pharmacophore fragments in FCS we have started systematic synthesis of oligosaccharides with well-defined structure related to various fragments of these polysaccharides. In this communication, the synthesis of non-sulfated and selectively O-sulfated di- and trisaccharides structurally related to branching sites of FCS is described. The target compounds are built up of propyl β-d-glucuronic acid residue bearing at O-3 α-l-fucosyl or α-l-fucosyl-(1→3)-α-l-fucosyl substituents. O-Sulfation pattern in the fucose units of the synthetic targets was selected according to the known to date holothurian FCS structures. Stereospecific α-glycoside bond formation was achieved using 2-O-benzyl-3,4-di-O-chloroacetyl-α-l-fucosyl trichloroacetimidate as a donor. Stereochemical outcome of the glycosylation was explained by the remote participation of the chloroacetyl groups with the formation of the stabilized glycosyl cations, which could be attacked by the glycosyl acceptor only from the α-side. The experimental results were in good agreement with the SCF/MP2 calculated energies of such participation. The synthesized oligosaccharides are regarded as model compounds for the determination of a structure-activity relationship in FCS.

  2. Metabolic Flexibility of Sulfate Reducing Bacteria

    Directory of Open Access Journals (Sweden)

    Caroline M. Plugge

    2011-05-01

    Full Text Available Dissimilatory sulfate-reducing prokaryotes (SRB are a very diverse group of anaerobic bacteria that are omnipresent in nature and play an imperative role in the global cycling of carbon and sulfur. In anoxic marine sediments sulfate reduction accounts for up to 50% of the entire organic mineralization in coastal and shelf ecosystems where sulfate diffuses several meters deep into the sediment. As a consequence, SRB would be expected in the sulfate-containing upper sediment layers, whereas methanogenic Archaea would be expected to succeed in the deeper sulfate-depleted layers of the sediment. Where sediments are high in organic matter, sulfate is depleted at shallow sediment depths, and biogenic methane production will occur. In the absence of sulfate, many SRB ferment organic acids and alcohols, producing hydrogen, acetate, and carbon dioxide, and may even rely on hydrogen- and acetate-scavenging methanogens to convert organic compounds to methane. SRB can establish two different life styles, and these can be termed as sulfidogenic and acetogenic, hydrogenogenic metabolism. The advantage of having different metabolic capabilities is that it raises the chance of survival in environments when electron acceptors become depleted. In marine sediments, SRB and methanogens do not compete but rather complement each other in the degradation of organic matter.Also in freshwater ecosystems with sulfate concentrations of only 10-200 μM, sulfate is consumed efficiently within the top several cm of the sediments. Here, many of the δ-Proteobacteria present have the genetic machinery to perform dissimilatory sulfate reduction, yet they have an acetogenic, hydrogenogenic way of life.In this review we evaluate the physiology and metabolic mode of SRB in relation with their environment.

  3. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  4. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  5. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  6. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  7. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  8. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  11. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  12. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  13. ExternE: Externalities of energy Vol. 1. Summary

    International Nuclear Information System (INIS)

    Holland, M.; Berry, J.

    1995-01-01

    There is a growing requirement for policy analysts to take account of the environment in their decision making and to undertake the specified cost-benefit analysis. Within the European Union this is reflected in the 5th Environmental Action Programme, and the Commission's White Paper entitled 'Growth, competitiveness, employment and the ways forward to the 21st century'. This has led to a need for evaluation of environmental externalities. The ExternE Project commenced in 1991 as the European part of a collaborative study between the European Commission and the US Department of Energy. It aims to be the first systematic approach to the evaluation of external costs of a wide range of different fuel cycles. The project will result in an operational accounting framework for the quantification and monetarisation of priority environmental and other externalities. This framework will allow the calculation of the marginal external costs and benefits for specific power plants, at specific sites using specified technologies. There are three major phases in the project. Phase 1 was undertaken in collaboration with the US Department of Energy. In this phase the teams jointly developed the conceptual approach and methodology and shared scientific information for application to a number of fuel cycles. On the European side work concentrated on the nuclear and coal fuel cycles which together were expected to raise many of the fundamental issues in fuel cycle analysis. The project is currently nearing completion of Phase 2. During this phase the methodology has been applied to a wide range of different fossil, nuclear and renewable fuel cycles for power generation and energy conservation options. Also a series of National Implementation Programmes is underway in which the methodology and accounting framework are being applied to reference sites throughout Europe. In addition the general methodology is being extended to address the evaluation of externalities associated with

  14. Externalities of fuel cycles 'ExternE' project. Summary report

    International Nuclear Information System (INIS)

    Holland, M.; Berry, J.

    1994-01-01

    There is a growing requirement for policy analysts to take account of the environment in their decision making and to undertake the specified cost-benefit analysis. Within the European Union this is reflected in the 5th Environmental Action Programme, and the Commission's White Paper entitled 'Growth, competitiveness, employment and the ways forward to the 21st century'. This has led to a need for evaluation of environmental externalities. The ExternE Project commenced in 1991 as the European part of a collaborative study between the European Commission and the US Department of Energy. It aims to be the first systematic approach to the evaluation of external costs of a wide range of different fuel cycles. The project will result in an operational accounting framework for the quantification and monetarisation of priority environmental and other externalities. This framework will allow the calculation of the marginal external costs and benefits for specific power plants, at specific sites using specified technologies. There are three major phases in the project. Phase I was undertaken in collaboration with the US Department of Energy. In this phase the teams jointly developed the conceptual approach and methodology and shared scientific information for application to a number of fuel cycles. On the European side work concentrated on the nuclear and coal fuel cycles which together were expected to raise many of the fundamental issues in fuel cycle analysis. The project is currently nearing completion of Phase 2. During this phase the methodology has been applied to a wide range of different fossil, nuclear and renewable fuel cycles for power generation and energy conservation options. Also a series of National Implementation Programmes are underway in which the methodology and accounting framework are being applied to reference sites throughout Europe. In addition the general methodology is being extended to address the evaluation of externalities associated with

  15. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  16. Corrosion of 2205 Duplex Stainless Steel Weldment in Chloride Medium Containing Sulfate-Reducing Bacteria

    Science.gov (United States)

    Antony, P. J.; Singh Raman, R. K.; Kumar, Pradeep; Raman, R.

    2008-11-01

    Influence of changes in microstructure caused due to welding on microbiologically influenced corrosion of a duplex stainless steel was studied by exposing the weldment and parent metal to chloride medium containing sulfate-reducing bacteria (SRB). Identically prepared coupons (same area and surface finish) exposed to sterile medium were used as the control. Etching-type attack was observed in the presence of SRB, which was predominant in the heat-affected zone (HAZ) of the weldment. The anodic polarization studies indicated an increase in current density for coupon exposed to SRB-containing medium as compared to that obtained for coupon exposed to sterile medium. The scanning electron microscopy (SEM) observations after anodic polarization revealed that the attack was preferentially in the ferrite phase of HAZ of the weldment, whereas it was restricted to the austenite phase of the parent metal.

  17. Cyber-Attacks and the Risks for CERN

    CERN Multimedia

    Computer Security Team

    2013-01-01

    In the previous Bulletin, we discussed the cyber-risks for the accelerator complex. However, looking at the broader picture, the cyber-risks for CERN are much more diverse.   Attacks can not only harm the operation of accelerators or experiments, but also impact negatively on the operation of the Organization as a whole and/or its reputation. This would not only hamper and impede our work while making us looking plain stupid, but might also make funding agencies reconsider whether their money is well invested in CERN… Examples? Sure, let’s be imaginative! What would be the consequences, if: a laptop holding sensitive CERN documents is lost or stolen, and ends up on eBay? your password is compromised and your mail account misused to send nasty messages to thousands of external mail addresses? an attacker manages to add photos of naked women/men onto a prominent CERN website, and boasts about this on Twitter? confidential documents like job application forms or passwo...

  18. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  19. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  20. External radiation surveillance

    International Nuclear Information System (INIS)

    Antonio, E.J.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report describes how external radiation was measured, how surveys were performed, and the results of these measurements and surveys. External radiation exposure rates were measured at locations on and off the Hanford Site using thermoluminescent dosimeters (TLD). External radiation and contamination surveys were also performed with portable radiation survey instruments at locations on and around the Hanford Site

  1. External radiation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report describes how external radiation was measured, how surveys were performed, and the results of these measurements and surveys. External radiation exposure rates were measured at locations on and off the Hanford Site using thermoluminescent dosimeters (TLD). External radiation and contamination surveys were also performed with portable radiation survey instruments at locations on and around the Hanford Site.

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. Extraction of uranyl sulfate with primary amine

    International Nuclear Information System (INIS)

    Mrnka, M.; Bizek, V.; Nekovar, P.; Cizevska, S.; Schroetterova, D.

    1984-01-01

    PRIMENE JM-T was used for extraction. Its composition was found to approach the general formula C 21 H 43 NH 2 . It was found that the extraction of uranyl sulfate is lower in case of a higher steady-state concentration of sulfuric acid in the aqueous phase. Extraction is accompanied with coextraction of water. The results obtained showed that uranyl sulfate passes into the organic phase by two mechanisms: extraction with amine sulfate and extraction with free amine. A mathematical description of the process was made based on the obtained results. (E.S.)

  4. Chlorate: a reversible inhibitor of proteoglycan sulfation

    International Nuclear Information System (INIS)

    Humphries, D.E.; Silbert, J.E.

    1988-01-01

    Bovine aorta endothelial cells were cultured in medium containing [ 3 H]glucosamine, [ 35 S]sulfate, and various concentrations of chlorate. Cell growth was not affected by 10 mM chlorate, while 30 mM chlorate had a slight inhibitory effect. Chlorate concentrations greater than 10 mM resulted in significant undersulfation of chondroitin. With 30 mM chlorate, sulfation of chondroitin was reduced to 10% and heparan to 35% of controls, but [ 3 H]glucosamine incorporation on a per cell basis did not appear to be inhibited. Removal of chlorate from the culture medium of cells resulted in the rapid resumption of sulfation

  5. ExternE: Externalities of energy Vol. 5. Nuclear

    International Nuclear Information System (INIS)

    Dreicer, M.; Tort, V.; Manen, P.

    1995-01-01

    Since the early 1970s, there has been increased interest in the environmental impacts that are caused by the generation of electricity. The comparative risk assessment studies at that time used mainly deaths and injuries as impact indicators. By the end of the 1980s studies changed to the assessment of the costs imposed on society and the environment that were not included in the market price of the energy produced, the so-called external costs. The preliminary studies that were published set the conceptual basis, grounded in neo-classical economics, for the valuation of the health and environmental impacts that could be assessed. As a consequence of the many questions raised by the methodologies employed by these early studies, Directorate General XII (DG XII) of the Commission of the European Communities established a collaborative research programme with the United States Department of Energy to identify an appropriate methodology for this type of work. Following the completion of this collaboration, the DG XII programme has continued as the ExternE project. The main objective of the work carried out at CEPN was to develop an impact pathway methodology for the nuclear fuel cycle that would be consistent with the methodologies developed for other fuel cycles, without loosing the nuclear-specific techniques required for a proper evaluation. In this way, comparisons between the different fuel cycles would be possible. This report presents the methodology and demonstration of the results in the context of the French nuclear fuel cycle. The United States team at Oak Ridge National Laboratory has previously issued a draft report on the results of their assessment. The French fuel cycle was broken down into 8 separate stages. Reference sites and 1990s technology were chosen to represent the total nuclear fuel cycle, as it exists today. In addition, the transportation of material between the sites was considered. The facilities are assessed for routine operation, except

  6. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  7. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  8. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  9. Vibrational spectra and crystal lattice dynamics of hexahydrates of zinc potassium and ammonium sulfates

    Science.gov (United States)

    Barashkov, M. V.; Komyak, A. I.; Shashkov, S. N.

    2000-03-01

    The IR spectra and polarized Raman spectra of crystals of hexahydrates of zinc potassium and ammonium sulfates have been obtained experimentally at 93 K and at room temperature. The frequencies and modes of normal vibrations of the octahedral complex [Zn(H2O)6]2+ have been calculated. The assignment of the observed lines of the internal and external vibrations of the crystal cell has been made by calculations and by factor-group analysis.

  10. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  11. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  12. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  13. Polymorphism of nickel sulfate hexahydrate

    International Nuclear Information System (INIS)

    Angel, R.J.; Finger, L.W.

    1988-01-01

    NiSO 4 .6H 2 O, M r =262.85; data collections with Mo Kα radiation, λ=0.7093 A, room temperature. Monoclinic polymorph: C2/c, a=9.880(3), b=7.228(2), c=24.130(3) A, β=98.38(2) 0 , V=1704.7(6) A 3 , Z=8, D x =2.05 g cm -3 , μ=25.54 cm -1 , F(000)=1088, R=0.031 (wR=0.038) for 2176 observed reflections. Tetragonal polymorph: P4 1 2 1 2, a=6.780 (1), c=18.285 (2) A, V=840.5 (3) A 3 , Z=4, D x =2.07 g cm -3 , μ=25.81 cm -1 , F(000)=544, R=0.045 (wR=0.050) for 2102 observed reflections. The structure of the tetragonal polymorph originally determined (without H positions) by Beevers and Lipson and refined by O'Connor and Dale and Stadnicka, Glazer and Koralewski, is confirmed by refinement of X-ray diffraction data. The structure of the monoclinic polymorph is confirmed as being isostructural with NiSO 4 .6D 2 O, and a number of other hexahydrate sulfates, e.g. MgSO 4 .6H 2 O. Both structures contain isolated [Ni(H 2 O 6 ] octahedra and [SO 4 ] tetrahedra linked by hydrogen bonding. (orig.)

  14. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  15. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  16. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  17. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  18. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  19. Sulfate reduction and methanogenesis at a freshwater

    DEFF Research Database (Denmark)

    Iversen, Vibeke Margrethe Nyvang; Andersen, Martin Søgaard; Jakobsen, Rasmus

    The freshwater-seawater interface was studied in a ~9-m thick anaerobic aquifer located in marine sand and gravel with thin peat lenses. Very limited amounts of iron-oxides are present. Consequently, the dominating redox processes are sulfate reduction and methanogenesis, and the groundwater...... is enriched in dissolved sulfide, methane and bicarbonate. Under normal conditions the seawater-freshwater interface is found at a depth of 4 m at the coastline and reaches the bottom of the aquifer 40 m inland. However, occasional flooding of the area occurs, introducing sulfate to the aquifer. Groundwater...... chemistry was studied in a 120 m transect perpendicular to the coast. Cores were taken for radiotracer rate measurements of sulfate reduction and methanogenesis. In the saline part of the aquifer 35 m inland, sulfate reduction was the dominant process with rates of 0.1-10 mM/year. In the freshwater part 100...

  20. Lymphocyte mobilization by dextran sulfate in beagles

    International Nuclear Information System (INIS)

    Ragan, H.A.; Debban, K.H.

    1978-01-01

    Dogs manifesting 239 Pu-induced lymphopenia responded to the lymphocyte-mobilizing agent, dextran sulfate, to a degree similar to that observed in control dogs. No life-threatening increase in prothrombin times or hemorrhagic tendencies were observed

  1. Sulfated cellulose thin films with antithrombin affinity

    Directory of Open Access Journals (Sweden)

    2009-11-01

    Full Text Available Cellulose thin films were chemically modified by in situ sulfation to produce surfaces with anticoagulant characteristics. Two celluloses differing in their degree of polymerization (DP: CEL I (DP 215–240 and CEL II (DP 1300–1400 were tethered to maleic anhydride copolymer (MA layers and subsequently exposed to SO3•NMe3 solutions at elevated temperature. The impact of the resulting sulfation on the physicochemical properties of the cellulose films was investigated with respect to film thickness, atomic composition, wettability and roughness. The sulfation was optimized to gain a maximal surface concentration of sulfate groups. The scavenging of antithrombin (AT by the surfaces was determined to conclude on their potential anticoagulant properties.

  2. COMBINED ALUMINIUM SULFATE/HYDROXIDE PROCESS FOR ...

    African Journals Online (AJOL)

    sulfate, and used for fluoride removal from water by combining with Nalgonda Technique. ... effects on human health and could result in fluorosis. ... [23], nanoscale aluminium oxide hydroxide (AlOOH) [24] and natural zeolite [25], were among.

  3. ROE Wet Sulfate Deposition 2009-2011

    Data.gov (United States)

    U.S. Environmental Protection Agency — The raster data represent the amount of wet sulfate deposition in kilograms per hectare from 2009 to 2011. Summary data in this indicator were provided by EPA’s...

  4. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  5. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  6. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  7. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  8. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  9. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  10. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  11. [External cephalic version].

    Science.gov (United States)

    Navarro-Santana, B; Duarez-Coronado, M; Plaza-Arranz, J

    2016-08-01

    To analyze the rate of successful external cephalic versions in our center and caesarean sections that would be avoided with the use of external cephalic versions. From January 2012 to March 2016 external cephalic versions carried out at our center, which were a total of 52. We collected data about female age, gestational age at the time of the external cephalic version, maternal body mass index (BMI), fetal variety and situation, fetal weight, parity, location of the placenta, amniotic fluid index (ILA), tocolysis, analgesia, and newborn weight at birth, minor adverse effects (dizziness, hypotension and maternal pain) and major adverse effects (tachycardia, bradycardia, decelerations and emergency cesarean section). 45% of the versions were unsuccessful and 55% were successful. The percentage of successful vaginal delivery in versions was 84% (4% were instrumental) and 15% of caesarean sections. With respect to the variables studied, only significant differences in birth weight were found; suggesting that birth weight it is related to the outcome of external cephalic version. Probably we did not find significant differences due to the number of patients studied. For women with breech presentation, we recommend external cephalic version before the expectant management or performing a cesarean section. The external cephalic version increases the proportion of fetuses in cephalic presentation and also decreases the rate of caesarean sections.

  12. Piezosurgery in External Dacryocystorhinostomy.

    Science.gov (United States)

    Czyz, Craig N; Fowler, Amy M; Dutton, Jonathan J; Cahill, Kenneth V; Foster, Jill A; Hill, Robert H; Everman, Kelly R; Nabavi, Cameron B

    Dacryocystorhinostomy (DCR) can be performed via an external or endoscopic approach. The use of ultrasonic or piezosurgery has been well described for endoscopic DCRs but is lacking for external DCRs. This study presents a case series of external DCRs performed using piezosurgery evaluating results and complications. Prospective, consecutive case series of patients undergoing primary external DCR for lacrimal drainage insufficiency. A standard external DCR technique was used using 1 of 2 piezosurgery systems for all bone incision. All patients received silicone intubation to the lacrimal system. Surgical outcome was measured in terms of patient-reported epiphora as follows: 1) complete resolution, 2) improvement >50%, 3) improvement 50% improvement. There were 4 patients (7%) who had <50% improvement. There was 1 (2%) intraoperative complication and 2 (4%) postoperative complications recorded. Piezourgery is a viable modality for performing external DCRs. The lack of surgical complications shows a potential for decreased soft tissues damage. The surgical success rate based on patient-reported epiphora is similar to those published for mechanical external DCRs. This modality may benefit the novice surgeon in the reduction of soft and mucosal tissue damage.

  13. Polymorphism of nickel sulfate hexahydrate

    Energy Technology Data Exchange (ETDEWEB)

    Angel, R.J.; Finger, L.W.

    1988-11-15

    NiSO/sub 4/.6H/sub 2/O, M/sub r/=262.85; data collections with Mo K..cap alpha.. radiation, lambda=0.7093 A, room temperature. Monoclinic polymorph: C2/c, a=9.880(3), b=7.228(2), c=24.130(3) A, ..beta..=98.38(2)/sup 0/, V=1704.7(6) A/sup 3/, Z=8, D/sub x/=2.05 g cm/sup -3/, ..mu..=25.54 cm/sup -1/, F(000)=1088, R=0.031 (wR=0.038) for 2176 observed reflections. Tetragonal polymorph: P4/sub 1/2/sub 1/2, a=6.780 (1), c=18.285 (2) A, V=840.5 (3) A/sup 3/, Z=4, D/sub x/=2.07 g cm/sup -3/, ..mu..=25.81 cm/sup -1/, F(000)=544, R=0.045 (wR=0.050) for 2102 observed reflections. The structure of the tetragonal polymorph originally determined (without H positions) by Beevers and Lipson and refined by O'Connor and Dale and Stadnicka, Glazer and Koralewski, is confirmed by refinement of X-ray diffraction data. The structure of the monoclinic polymorph is confirmed as being isostructural with NiSO/sub 4/.6D/sub 2/O, and a number of other hexahydrate sulfates, e.g. MgSO/sub 4/.6H/sub 2/O. Both structures contain isolated (Ni(H/sub 2/O/sub 6/) octahedra and (SO/sub 4/) tetrahedra linked by hydrogen bonding.

  14. Estimating parameters of chaotic systems synchronized by external driving signal

    International Nuclear Information System (INIS)

    Wu Xiaogang; Wang Zuxi

    2007-01-01

    Noise-induced synchronization (NIS) has evoked great research interests recently. Two uncoupled identical chaotic systems can achieve complete synchronization (CS) by feeding a common noise with appropriate intensity. Actually, NIS belongs to the category of external feedback control (EFC). The significance of applying EFC in secure communication lies in fact that the trajectory of chaotic systems is disturbed so strongly by external driving signal that phase space reconstruction attack fails. In this paper, however, we propose an approach that can accurately estimate the parameters of the chaotic systems synchronized by external driving signal through chaotic transmitted signal, driving signal and their derivatives. Numerical simulation indicates that this approach can estimate system parameters and external coupling strength under two driving modes in a very rapid manner, which implies that EFC is not superior to other methods in secure communication

  15. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  16. Automated External Defibrillator

    Science.gov (United States)

    ... leads to a 10 percent reduction in survival. Training To Use an Automated External Defibrillator Learning how to use an AED and taking a CPR (cardiopulmonary resuscitation) course are helpful. However, if trained ...

  17. Energy policy and externalities

    International Nuclear Information System (INIS)

    Bertel, E.; Fraser, P.

    2002-01-01

    External costs of energy have been assessed in a number of authoritative and reliable studies based upon widely accepted methodologies such as life cycle analysis (LCA). However, although those costs are recognised by most stakeholders and decision makers, results from analytical work on externalities and LCA studies are seldom used in policy making. The International Energy Agency (IEA) and the Nuclear Energy Agency (NEA) convened a joint workshop in November 2001 to offer experts and policy makers an opportunity to present state-of-the-art results from analytical work on externalities and debate issues related to the relevance of external costs and LCA for policy-making purposes. The findings from the workshop highlight the need for further work in the field and the potential rote of international organisations like the IEA and the NEA in this context. (authors)

  18. Externally Verifiable Oblivious RAM

    Directory of Open Access Journals (Sweden)

    Gancher Joshua

    2017-04-01

    Full Text Available We present the idea of externally verifiable oblivious RAM (ORAM. Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making false accusations. We then give modifications of the Path ORAM [15] and Ring ORAM [9] protocols that meet this security definition. These protocols both have the same asymptotic runtimes as the semi-honest original versions and require the external verifier to be involved only when the client or server deviates from the protocol. Finally, we implement externally verified ORAM, along with an automated cryptocurrency contract to use as the external verifier.

  19. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  20. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  1. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  2. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  3. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  4. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  5. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  6. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  7. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  8. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  9. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  10. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  11. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  12. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  13. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  14. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  15. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  16. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  17. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  18. Oxygen isotopic fractionation during bacterial sulfate reduction

    Science.gov (United States)

    Balci, N.; Turchyn, A. V.; Lyons, T.; Bruchert, V.; Schrag, D. P.; Wall, J.

    2006-12-01

    Sulfur isotope fractionation during bacterial sulfate reduction (BSR) is understood to depend on a variety of environmental parameters, such as sulfate concentration, temperature, cell specific sulfate reduction rates, and the carbon substrate. What controls oxygen isotope fractionation during BSR is less well understood. Some studies have suggested that carbon substrate is important, whereas others concluded that there is a stoichiometric relationship between the fractionations of sulfur and oxygen during BSR. Studies of oxygen fractionation are complicated by isotopic equilibration between sulfur intermediates, particularly sulfite, and water. This process can modify the isotopic composition of the extracellular sulfate pool (δ18OSO4 ). Given this, the challenge is to distinguish between this isotopic equilibration and fractionations linked to the kinetic effects of the intercellular enzymes and the incorporation of sulfate into the bacterial cell. The δ18OSO4 , in concert with the sulfur isotope composition of sulfate (δ34SSO4), could be a powerful tool for understanding the pathways and environmental controls of BSR in natural systems. We will present δ18OSO4 data measured from batch culture growth of 14 different species of sulfate reducing bacteria for which sulfur isotope data were previously published. A general observation is that δ18OSO4 shows little isotopic change (kinetic effect during BSR and/or equilibration between sulfur intermediates and the isotopically light water (~-5‰) of the growth medium. Our present batch culture data do not allow us to convincingly isolate the magnitude and the controlling parameters of the kinetic isotope effect for oxygen. However, ongoing growth of mutant bacteria missing enzymes critical in the different steps of BSR may assist in this mission.

  19. Sulfation of corrosive alkali chlorides by ammonium sulfate in a biomass fired CFB boiler

    Energy Technology Data Exchange (ETDEWEB)

    Brostroem, Markus; Backman, Rainer; Nordin, Anders [Energy Technology and Thermal Process Chemistry, Umeaa University, SE-901 87 Umeaa (Sweden); Kassman, Haakan [Vattenfall Power Consultant AB, Box 1046, SE-611 29 Nykoeping (Sweden); Helgesson, Anna; Berg, Magnus; Andersson, Christer [Vattenfall Research and Development AB, SE-814 26 Aelvkarleby (Sweden)

    2007-12-15

    Biomass and waste derived fuels contain relatively high amounts of alkali and chlorine, but contain very little sulfur. Combustion of such fuels can result in increased deposit formation and superheater corrosion. These problems can be reduced by using a sulfur containing additive, such as ammonium sulfate, which reacts with the alkali chlorides and forms less corrosive sulfates. Ammonium sulfate injection together with a so-called in situ alkali chloride monitor (IACM) is patented and known as ''ChlorOut''. IACM measures the concentrations of alkali chlorides (mainly KCl in biomass combustion) at superheater temperatures. Tests with and without spraying ammonium sulfate into the flue gases have been performed in a 96MW{sub th}/25MW{sub e} circulating fluidized bed (CFB) boiler. The boiler was fired mainly with bark and a chlorine containing waste. KCl concentration was reduced from more than 15 ppm to approximately 2 ppm during injection of ammonium sulfate. Corrosion probe measurements indicated that both deposit formation and material loss due to corrosion were decreased using the additive. Analysis of the deposits showed significantly higher concentration of sulfur and almost no chlorine in the case with ammonium sulfate. Results from impactor measurements supported that KCl was sulfated to potassium sulfate by the additive. (author)

  20. 21 CFR 524.1484e - Neomycin sulfate and polymyxin B sulfate ophthalmic solution.

    Science.gov (United States)

    2010-04-01

    ... ophthalmic solution. 524.1484e Section 524.1484e Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS OPHTHALMIC AND TOPICAL DOSAGE FORM NEW ANIMAL DRUGS § 524.1484e Neomycin sulfate and polymyxin B sulfate ophthalmic solution. (a...

  1. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  2. Modeling of sulfation of potassium chloride by ferric sulfate addition during grate-firing of biomass

    DEFF Research Database (Denmark)

    Wu, Hao; Jespersen, Jacob Boll; Aho, Martti

    2013-01-01

    Potassium chloride, KCl, formed from critical ash-forming elements released during combustion may lead to severe ash deposition and corrosion problems in biomass-fired boilers. Ferric sulfate, Fe2(SO4)3 is an effective additive, which produces sulfur oxides (SO2 and SO3) to convert KCl to the less...... harmful K2SO4. In the present study the decomposition of ferric sulfate is studied in a fast-heating rate thermogravimetric analyzer (TGA), and a kinetic model is proposed to describe the decomposition process. The yields of SO2 and SO3 from ferric sulfate decomposition are investigated in a laboratory......-scale tube reactor. It is revealed that approximately 40% of the sulfur is released as SO3, the remaining fraction being released as SO2. The proposed decomposition model of ferric sulfate is combined with a detailed gas phase kinetic model of KCl sulfation, and a simplified model of K2SO4 condensation...

  3. The electrical and thermal properties of sodium sulfate mixed with lithium sulfate, yttrium sulfate, and silicon dioxide

    International Nuclear Information System (INIS)

    Imanaka, N.; Yamaguchi, Y.; Adachi, G.; Shiokawa, J.

    1986-01-01

    Sodium sulfate mixed with lithium sulfate, yttrium sulfate, and silicon dioxide was prepared. The thermal and electrical properties of its phases were investigated. The Na 2 SO 4 -Li 2 SO 4 -Y 2 (SO 4 ) 3 SiO 2 samples are similar to the Na 2 SO 4 -I phase (a high temperature phase), which is appreciably effective for Na + ionic conduction. Phase transformation was considerably suppressed by mixing. Electromotive force (EMF) was measured, using Na 2 SO 4 -Li 2 SO 4 -Y 2 (SO 4 ) 3 -SiO 2 as a solid electrolyte, by constructing an SO 2 gas concentration cell. The measured EMF's at 823 and 773 K were in fairly good accordance with the calculated EMF's for inlet SO 2 gas concentration between 30 ppm and 1%, and 500 ppm and 0.5% respectively

  4. Heparan sulfate-chondroitin sulfate hybrid proteoglycan of the cell surface and basement membrane of mouse mammary epithelial cells

    International Nuclear Information System (INIS)

    David, G.; Van den Berghe, H.

    1985-01-01

    Chondroitin sulfate represents approximately 15% of the 35 SO 4 -labeled glycosaminoglycans carried by the proteoglycans of the cell surface and of the basolateral secretions of normal mouse mammary epithelial cells in culture. Evidence is provided that these chondroitin sulfate-carrying proteoglycans are hybrid proteoglycans, carrying both chondroitin sulfate and heparan sulfate chains. Complete N-desulfation but limited O-desulfation, by treatment with dimethyl sulfoxide, of the proteoglycans decreased the anionic charge of the chondroitin sulfate-carrying proteoglycans to a greater extent than it decreased the charge of their constituent chondroitin sulfate chains. Partial depolymerization of the heparan sulfate residues of the proteoglycans with nitrous acid or with heparin lyase also reduced the effective molecular radius of the chondroitin sulfate-carrying proteoglycans. The effect of heparin lyase on the chondroitin sulfate-carrying proteoglycans was prevented by treating the proteoglycan fractions with dimethyl sulfoxide, while the effect of nitrous acid on the dimethyl sulfoxide-treated proteoglycans was prevented by acetylation. This occurrence of heparan sulfate-chondroitin sulfate hybrid proteoglycans suggests that the substitution of core proteins by heparan sulfate or chondroitin sulfate chains may not solely be determined by the specific routing of these proteins through distinct chondroitin sulfate and heparan sulfate synthesizing mechanisms. Moreover, regional and temporal changes in pericellular glycosaminoglycan compositions might be due to variable postsynthetic modification of a single gene product

  5. Co-existence of Methanogenesis and Sulfate Reduction with Common Substrates in Sulfate-Rich Estuarine Sediments

    Directory of Open Access Journals (Sweden)

    Michal Sela-Adler

    2017-05-01

    Full Text Available The competition between sulfate reducing bacteria and methanogens over common substrates has been proposed as a critical control for methane production. In this study, we examined the co-existence of methanogenesis and sulfate reduction with shared substrates over a large range of sulfate concentrations and rates of sulfate reduction in estuarine systems, where these processes are the key terminal sink for organic carbon. Incubation experiments were carried out with sediment samples from the sulfate-methane transition zone of the Yarqon (Israel estuary with different substrates and inhibitors along a sulfate concentrations gradient from 1 to 10 mM. The results show that methanogenesis and sulfate reduction can co-exist while the microbes share substrates over the tested range of sulfate concentrations and at sulfate reduction rates up to 680 μmol L-1 day-1. Rates of methanogenesis were two orders of magnitude lower than rates of sulfate reduction in incubations with acetate and lactate, suggesting a higher affinity of sulfate reducing bacteria for the available substrates. The co-existence of both processes was also confirmed by the isotopic signatures of δ34S in the residual sulfate and that of δ13C of methane and dissolved inorganic carbon. Copy numbers of dsrA and mcrA genes supported the dominance of sulfate reduction over methanogenesis, while showing also the ability of methanogens to grow under high sulfate concentration and in the presence of active sulfate reduction.

  6. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  7. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  8. Sulfation in lead-acid batteries

    Science.gov (United States)

    Catherino, Henry A.; Feres, Fred F.; Trinidad, Francisco

    Virtually, all military land vehicle systems use a lead-acid battery to initiate an engine start. The maintainability of these batteries and as a consequence, system readiness, has suffered from a lack of understanding of the reasons for battery failure. Often, the term most commonly heard for explaining the performance degradation of lead-acid batteries is the word, sulfation. Sulfation is a residual term that came into existence during the early days of lead-acid battery development. The usage is part of the legend that persists as a means for interpreting and justifying the eventual performance deterioration and failure of lead-acid batteries. The usage of this term is confined to the greater user community and, over time, has encouraged a myriad of remedies for solving sulfation problems. One can avoid the connotations associated with the all-inclusive word, sulfation by visualizing the general "sulfation" effect in terms of specific mechanistic models. Also, the mechanistic models are essential for properly understanding the operation and making proper use this battery system. It is evident that the better the model, the better the level of understanding.

  9. Mechanistic modeling of biocorrosion caused by biofilms of sulfate reducing bacteria and acid producing bacteria.

    Science.gov (United States)

    Xu, Dake; Li, Yingchao; Gu, Tingyue

    2016-08-01

    Biocorrosion is also known as microbiologically influenced corrosion (MIC). Most anaerobic MIC cases can be classified into two major types. Type I MIC involves non-oxygen oxidants such as sulfate and nitrate that require biocatalysis for their reduction in the cytoplasm of microbes such as sulfate reducing bacteria (SRB) and nitrate reducing bacteria (NRB). This means that the extracellular electrons from the oxidation of metal such as iron must be transported across cell walls into the cytoplasm. Type II MIC involves oxidants such as protons that are secreted by microbes such as acid producing bacteria (APB). The biofilms in this case supply the locally high concentrations of oxidants that are corrosive without biocatalysis. This work describes a mechanistic model that is based on the biocatalytic cathodic sulfate reduction (BCSR) theory. The model utilizes charge transfer and mass transfer concepts to describe the SRB biocorrosion process. The model also includes a mechanism to describe APB attack based on the local acidic pH at a pit bottom. A pitting prediction software package has been created based on the mechanisms. It predicts long-term pitting rates and worst-case scenarios after calibration using SRB short-term pit depth data. Various parameters can be investigated through computer simulation. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  11. Immunohistochemical localization of chondroitin sulfate, chondroitin sulfate proteoglycan, heparan sulfate proteoglycan, entactin, and laminin in basement membranes of postnatal developing and adult rat lungs

    DEFF Research Database (Denmark)

    Sannes, P L; Burch, K K; Khosla, J

    1993-01-01

    Histologic preparations of lungs from 1-, 5-, 10-, 18-, and 25-day-old postnatal and adult rats were examined immunohistochemically with antibodies specific against chondroitin sulfate (CS), basement membrane chondroitin sulfate proteoglycan (BM-CSPG), heparan sulfate proteoglycan (HSPG), entactin...

  12. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  13. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  14. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  16. p-Cresyl sulfate and indoxyl sulfate in pediatric patients on chronic dialysis

    Directory of Open Access Journals (Sweden)

    Hye Sun Hyun

    2013-04-01

    Full Text Available &lt;b&gt;Purpose:&lt;/b&gt; Indoxyl sulfate and p- cresyl sulfate are important protein-bound uremic retention solutes whose levels can be partially reduced by renal replacement therapy. These solutes originate from intestinal bacterial protein fermentation and are associated with cardiovascular outcomes and chronic kidney disease progression. The aims of this study were to investigate the levels of indoxyl sulfate and p- cresyl sulfate as well as the effect of probiotics on reducing the levels of uremic toxins in pediatric patients on dialysis. &lt;b&gt;Methods:&lt;/b&gt; We enrolled 20 pediatric patients undergoing chronic dialysis; 16 patients completed the study. The patients underwent a 12-week regimen of VSL#3, a high-concentration probiotic preparation, and the serum levels of indoxyl sulfate and p- cresyl sulfate were measured before treatment and at 4, 8, and 12 weeks after the regimen by using fluorescence liquid chromatography. To assess the normal range of indoxyl sulfate and p- cresyl sulfate we enrolled the 16 children with normal glomerular filtration rate who had visited an outpatient clinic for asymptomatic microscopic hematuria that had been detected by a school screening in August 2011. &lt;b&gt;Results:&lt;/b&gt; The baseline serum levels of indoxyl sulfate and p- cresyl sulfate in the patients on chronic dialysis were significantly higher than those in the children with microscopic hematuria. The baseline serum levels of p- cresyl sulfate in the peritoneal dialysis group were significantly higher than those in the hemodialysis group. There were no significant changes in the levels of these uremic solutes after 12-week VSL#3 treatment in the patients on chronic dialysis. &lt;b&gt;Conclusion:&lt;/b&gt; The levels of the uremic toxins p- cresyl sulfate and indoxyl sulfate are highly elevated in pediatric patients on dialysis, but there was no significant effect by

  17. Sulfated glycopeptide nanostructures for multipotent protein activation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sungsoo S.; Fyrner, Timmy; Chen, Feng; Álvarez, Zaida; Sleep, Eduard; Chun, Danielle S.; Weiner, Joseph A.; Cook, Ralph W.; Freshman, Ryan D.; Schallmo, Michael S.; Katchko, Karina M.; Schneider, Andrew D.; Smith, Justin T.; Yun, Chawon; Singh, Gurmit; Hashmi, Sohaib Z.; McClendon, Mark T.; Yu, Zhilin; Stock, Stuart R.; Hsu, Wellington K.; Hsu, Erin L.; Stupp , Samuel I. (NWU)

    2017-06-19

    Biological systems have evolved to utilize numerous proteins with capacity to bind polysaccharides for the purpose of optimizing their function. A well-known subset of these proteins with binding domains for the highly diverse sulfated polysaccharides are important growth factors involved in biological development and tissue repair. We report here on supramolecular sulfated glycopeptide nanostructures, which display a trisulfated monosaccharide on their surfaces and bind five critical proteins with different polysaccharide-binding domains. Binding does not disrupt the filamentous shape of the nanostructures or their internal β-sheet backbone, but must involve accessible adaptive configurations to interact with such different proteins. The glycopeptide nanostructures amplified signalling of bone morphogenetic protein 2 significantly more than the natural sulfated polysaccharide heparin, and promoted regeneration of bone in the spine with a protein dose that is 100-fold lower than that required in the animal model. These highly bioactive nanostructures may enable many therapies in the future involving proteins.

  18. Distributed Classification of Localization Attacks in Sensor Networks Using Exchange-Based Feature Extraction and Classifier

    Directory of Open Access Journals (Sweden)

    Su-Zhe Wang

    2016-01-01

    Full Text Available Secure localization under different forms of attack has become an essential task in wireless sensor networks. Despite the significant research efforts in detecting the malicious nodes, the problem of localization attack type recognition has not yet been well addressed. Motivated by this concern, we propose a novel exchange-based attack classification algorithm. This is achieved by a distributed expectation maximization extractor integrated with the PECPR-MKSVM classifier. First, the mixed distribution features based on the probabilistic modeling are extracted using a distributed expectation maximization algorithm. After feature extraction, by introducing the theory from support vector machine, an extensive contractive Peaceman-Rachford splitting method is derived to build the distributed classifier that diffuses the iteration calculation among neighbor sensors. To verify the efficiency of the distributed recognition scheme, four groups of experiments were carried out under various conditions. The average success rate of the proposed classification algorithm obtained in the presented experiments for external attacks is excellent and has achieved about 93.9% in some cases. These testing results demonstrate that the proposed algorithm can produce much greater recognition rate, and it can be also more robust and efficient even in the presence of excessive malicious scenario.

  19. Formation of the natural sulfate aerosol

    Energy Technology Data Exchange (ETDEWEB)

    Kerminen, V.M.; Hillamo, R.; Maekinen, M.; Virkkula, A.; Maekelae, T.; Pakkanen, T. [Helsinki Univ. (Finland). Dept. of Physics

    1996-12-31

    Anthropogenic sulfate aerosol, together with particles from biomass burning, may significantly reduce the climatic warming due to man-made greenhouse gases. The radiative forcing of aerosol particles is based on their ability to scatter and absorb solar radiation (direct effect), and on their influences on cloud albedos and lifetimes (indirect effect). The direct aerosol effect depends strongly on the size, number and chemical composition of particles, being greatest for particles of 0.1-1 {mu}m in diameter. The indirect aerosol effect is dictated by the number of particles being able to act as cloud condensation nuclei (CCN). For sulfate particles, the minimum CCN size in tropospheric clouds is of the order of 0.05-0.2 {mu}m. To improve aerosol parameterizations in future climate models, it is required that (1) both primary and secondary sources of various particle types will be characterized at a greater accuracy, and (2) the influences of various atmospheric processes on the spatial and temporal distribution of these particles and their physico-chemical properties are known much better than at the present. In estimating the climatic forcing due to the sulfate particles, one of the major problems is to distinguish between sulfur from anthropogenic sources and that of natural origin. Global emissions of biogenic and anthropogenic sulfate pre-cursors are comparable in magnitude, but over regional scales either of these two source types may dominate. The current presentation is devoted to discussing the natural sulfate aerosol, including the formation of sulfur-derived particles in the marine environment, and the use of particulate methanesulfonic acid (MSA) as a tracer for the natural sulfate

  20. Formation of the natural sulfate aerosol

    Energy Technology Data Exchange (ETDEWEB)

    Kerminen, V M; Hillamo, R; Maekinen, M; Virkkula, A; Maekelae, T; Pakkanen, T [Helsinki Univ. (Finland). Dept. of Physics

    1997-12-31

    Anthropogenic sulfate aerosol, together with particles from biomass burning, may significantly reduce the climatic warming due to man-made greenhouse gases. The radiative forcing of aerosol particles is based on their ability to scatter and absorb solar radiation (direct effect), and on their influences on cloud albedos and lifetimes (indirect effect). The direct aerosol effect depends strongly on the size, number and chemical composition of particles, being greatest for particles of 0.1-1 {mu}m in diameter. The indirect aerosol effect is dictated by the number of particles being able to act as cloud condensation nuclei (CCN). For sulfate particles, the minimum CCN size in tropospheric clouds is of the order of 0.05-0.2 {mu}m. To improve aerosol parameterizations in future climate models, it is required that (1) both primary and secondary sources of various particle types will be characterized at a greater accuracy, and (2) the influences of various atmospheric processes on the spatial and temporal distribution of these particles and their physico-chemical properties are known much better than at the present. In estimating the climatic forcing due to the sulfate particles, one of the major problems is to distinguish between sulfur from anthropogenic sources and that of natural origin. Global emissions of biogenic and anthropogenic sulfate pre-cursors are comparable in magnitude, but over regional scales either of these two source types may dominate. The current presentation is devoted to discussing the natural sulfate aerosol, including the formation of sulfur-derived particles in the marine environment, and the use of particulate methanesulfonic acid (MSA) as a tracer for the natural sulfate

  1. Effect of barium sulfate contrast medium on rheology and sensory texture attributes in a model food.

    Science.gov (United States)

    Ekberg, O; Bulow, M; Ekman, S; Hall, G; Stading, M; Wendin, K

    2009-03-01

    The swallowing process can be visualized using videoradiography, by mixing food with contrast medium, e.g., barium sulfate (BaSO(4)), making it radiopaque. The sensory properties of foods may be affected by adding this medium. To evaluate if and to what extent sensory and rheological characteristics of mango purée were altered by adding barium sulfate to the food. This study evaluated four food samples based on mango purée, with no or added barium sulfate contrast medium (0%, 12.5%, 25.0%, and 37.5%), by a radiographic method, and measured sensory texture properties and rheological characteristics. The sensory evaluation was performed by an external trained panel using quantitative descriptive analysis. The ease of swallowing the foods was also evaluated. The sensory texture properties of mango purée were significantly affected by the added barium in all evaluated attributes, as was the perception of particles. Moreover, ease of swallowing was significantly higher in the sample without added contrast medium. All samples decreased in extensional viscosity with increasing extension rate, i.e., all samples were tension thinning. Shear viscosity was not as dependent on the concentration of BaSO(4) as extensional viscosity. Addition of barium sulfate to a model food of mango purée has a major impact on perceived sensory texture attributes as well as on rheological parameters.

  2. Malignant external otitis

    International Nuclear Information System (INIS)

    Dupuch, K.M.; Iryboz, T.; Firat, M.; Levy, C.; Tubiana, J.M.

    1991-01-01

    This paper illustrates the value of CT and MR in early diagnosis and spread of malignant external otitis. The authors retrospectively analyzed 15 patients with proved malignant external otitis examined with postcontrast high-resolution CT (15/15) and MR (6/15) (T1- and T2-weighting). Gallium studies were done in 6/15 patients. Early diagnosis was made when CT demonstrated a soft-tissue mass of the external auditory canal associated with scattered zones of cortical bone erosions (13/15). Spread of the disease was better delineated by MR than CT, especially skull base extension (6/15). Temporomandibular joint involvement with extension into parotid or/and masticator spaces 6/15 was as well detected with CT as with MR. If CT remains the first and best procedure for diagnosis, MR - despite its cost - appears a good procedure to depict exact anatomic spread, allowing therapeutic management

  3. Productivity Change and Externalities

    DEFF Research Database (Denmark)

    Kravtsova, Victoria

    2014-01-01

    This paper contributes to the analysis of the impact of externalities on the host country's total factor productivity by taking into account different dimensions of spillover effects. Namely, engagement in exporting and foreign ownership is generally perceived as being beneficial to individual...... firms and the economy as a whole. The approach used in the current research accounts for different internal as well as external factors that individual firms face and evaluates the effect on changes in productivity, technology as well as the efficiency of domestic firms. The empirical analysis focuses...... on Hungary. While the country leads the group of post-socialist countries in the amount of attracted foreign direct investments (FDI) the effect of this policy on the economy remains unclear. The research finds that different externalities play a different role in productivity, technological and efficiency...

  4. Externality or sustainability economics?

    International Nuclear Information System (INIS)

    Bergh, Jeroen C.J.M. van den

    2010-01-01

    In an effort to develop 'sustainability economics' Baumgaertner and Quaas (2010) neglect the central concept of environmental economics-'environmental externality'. This note proposes a possible connection between the concepts of environmental externality and sustainability. In addition, attention is asked for other aspects of 'sustainability economics', namely the distinction weak/strong sustainability, spatial sustainability and sustainable trade, distinctive sustainability policy, and the ideas of early 'sustainability economists'. I argue that both sustainability and externalities reflect a systems perspective and propose that effective sustainability solutions require that more attention is given to system feedbacks, notably other-regarding preferences and social interactions, and energy and environmental rebound. The case of climate change and policy is used to illustrate particular statements. As a conclusion, a list of 20 insights and suggestions for research is offered. (author)

  5. Metasurface external cavity laser

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Luyao, E-mail: luyaoxu.ee@ucla.edu; Curwen, Christopher A.; Williams, Benjamin S. [Department of Electrical Engineering, University of California, Los Angeles, California 90095 (United States); California NanoSystems Institute, University of California, Los Angeles, California 90095 (United States); Hon, Philip W. C.; Itoh, Tatsuo [Department of Electrical Engineering, University of California, Los Angeles, California 90095 (United States); Chen, Qi-Sheng [Northrop Grumman Aerospace Systems, Redondo Beach, California 90278 (United States)

    2015-11-30

    A vertical-external-cavity surface-emitting-laser is demonstrated in the terahertz range, which is based upon an amplifying metasurface reflector composed of a sub-wavelength array of antenna-coupled quantum-cascade sub-cavities. Lasing is possible when the metasurface reflector is placed into a low-loss external cavity such that the external cavity—not the sub-cavities—determines the beam properties. A near-Gaussian beam of 4.3° × 5.1° divergence is observed and an output power level >5 mW is achieved. The polarized response of the metasurface allows the use of a wire-grid polarizer as an output coupler that is continuously tunable.

  6. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  9. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  10. Inhibition of sulfate reduction in paddy soils

    Energy Technology Data Exchange (ETDEWEB)

    Vamos, R

    1958-12-13

    The hydrogen sulfide formed in waterlogged soils is a serious problem in rice cultivation. It inhibits the uptake of water and nutrients and may even cause root-rot. Results can best be obtained by preventing the formation of hydrogen sulfide. It is formed mainly by reduction of sulfate for which the cellulose-butyric acid fermentation provides the hydrogen source. Addition of ammonium or potassium nitrate prevents the formation of H/sub 2/S. The hydrogen produced by butyric acid fermentation is used to reduce nitrate and consequently cannot be utilized by the sulfate-reducing bacteria as a source of energy. 6 references.

  11. Measurement of chemical leaching potential of sulfate from landfill disposed sulfate containing wastes.

    Science.gov (United States)

    Sun, Wenjie; Barlaz, Morton A

    2015-02-01

    A number of sulfate-containing wastes are disposed in municipal solid wastes (MSW) landfills including residues from coal, wood, and MSW combustion, and construction and demolition (C&D) waste. Under anaerobic conditions that dominate landfills, the sulfate can be reduced to hydrogen sulfide which is problematic for several reasons including its low odor threshold, toxicity, and corrosive nature. The overall objective of this study was to evaluate existing protocols for the quantification of total leachable sulfate from solid samples and to compare their effectiveness and efficiency with a new protocol described in this study. Methods compared include two existing acid extraction protocols commonly used in the U.S., a pH neutral protocol that requires multiple changes of the leaching solution, and a new acid extraction method. The new acid extraction method was shown to be simple and effective to measure the leaching potential of sulfate from a range of landfill disposed sulfate-containing wastes. However, the acid extraction methods do not distinguish between sulfate and other forms of sulfur and are thus most useful when sulfate is the only form of sulfur present. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  13. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  14. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  15. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  16. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  17. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  18. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  19. The External Mind

    DEFF Research Database (Denmark)

    , Extended Mind and Distributed Cognition by Claudio Paolucci pp. 69-96 The Social Horizon of Embodied Language and Material Symbols by Riccardo Fusaroli pp. 97-123 Semiotics and Theories of Situated/Distributed Action and Cognition: a Dialogue and Many Intersections by Tommaso Granelli pp. 125-167 Building......The External Mind: an Introduction by Riccardo Fusaroli, Claudio Paolucci pp. 3-31 The sign of the Hand: Symbolic Practices and the Extended Mind by Massimiliano Cappuccio, Michael Wheeler pp. 33-55 The Overextended Mind by Shaun Gallagher pp. 57-68 The "External Mind": Semiotics, Pragmatism...

  20. The influence of different black carbon and sulfate mixing methods on their optical and radiative properties

    International Nuclear Information System (INIS)

    Zhang, Hua; Zhou, Chen; Wang, Zhili; Zhao, Shuyun; Li, Jiangnan

    2015-01-01

    Three different internal mixing methods (Core–Shell, Maxwell-Garnett, and Bruggeman) and one external mixing method are used to study the impact of mixing methods of black carbon (BC) with sulfate aerosol on their optical properties, radiative flux, and heating rate. The optical properties of a mixture of BC and sulfate aerosol particles are considered for three typical bands. The results show that mixing methods, the volume ratio of BC to sulfate, and relative humidity have a strong influence on the optical properties of mixed aerosols. Compared to internal mixing, external mixing underestimates the particle mass absorption coefficient by 20–70% and the particle mass scattering coefficient by up to 50%, whereas it overestimates the particle single scattering albedo by 20–50% in most cases. However, the asymmetry parameter is strongly sensitive to the equivalent particle radius, but is only weakly sensitive to the different mixing methods. Of the internal methods, there is less than 2% difference in all optical properties between the Maxwell-Garnett and Bruggeman methods in all bands; however, the differences between the Core–Shell and Maxwell-Garnett/Bruggeman methods are usually larger than 15% in the ultraviolet and visible bands. A sensitivity test is conducted with the Beijing Climate Center Radiation transfer model (BCC-RAD) using a simulated BC concentration that is typical of east-central China and a sulfate volume ratio of 75%. The results show that the internal mixing methods could reduce the radiative flux more effectively because they produce a higher absorption. The annual mean instantaneous radiative force due to BC–sulfate aerosol is about –3.18 W/m 2 for the external method and –6.91 W/m 2 for the internal methods at the surface, and –3.03/–1.56/–1.85 W/m 2 for the external/Core–Shell/(Maxwell-Garnett/Bruggeman) methods, respectively, at the tropopause. - Highlights: • The aerosol optical properties with different mixing

  1. Sulfates on Mars: A systematic Raman spectroscopic study of hydration states of magnesium sulfates

    Science.gov (United States)

    Wang, A.; Freeman, J.J.; Jolliff, B.L.; Chou, I.-Ming

    2006-01-01

    The martian orbital and landed surface missions, OMEGA on Mar Express and the two Mars Explorations Rovers, respectively, have yielded evidence pointing to the presence of magnesium sulfates on the martian surface. In situ identification of the hydration states of magnesium sulfates, as well as the hydration states of other Ca- and Fe- sulfates, will be crucial in future landed missions on Mars in order to advance our knowledge of the hydrologic history of Mars as well as the potential for hosting life on Mars. Raman spectroscopy is a technique well-suited for landed missions on the martian surface. In this paper, we report a systematic study of the Raman spectra of the hydrates of magnesium sulfate. Characteristic and distinct Raman spectral patterns were observed for each of the 11 distinct hydrates of magnesium sulfates, crystalline and non-crystalline. The unique Raman spectral features along with the general tendency of the shift of the position of the sulfate ??1 band towards higher wavenumbers with a decrease in the degree of hydration allow in situ identification of these hydrated magnesium sulfates from the raw Raman spectra of mixtures. Using these Raman spectral features, we have started the study of the stability field of hydrated magnesium sulfates and the pathways of their transformations at various temperature and relative humidity conditions. In particular we report on the Raman spectrum of an amorphous hydrate of magnesium sulfate (MgSO4??2H2O) that may have specific relevance for the martian surface. ?? 2006 Elsevier Inc. All rights reserved.

  2. Novel processes for anaerobic sulfate production from elemental sulfur by sulfate-reducing bacteria

    Science.gov (United States)

    Lovley, D.R.; Phillips, E.J.P.

    1994-01-01

    Sulfate reducers and related organisms which had previously been found to reduce Fe(III) with H2 or organic electron donors oxidized S0 to sulfate when Mn(IV) was provided as an electron acceptor. Organisms catalyzing this reaction in washed cell suspensions included Desulfovibrio desulfuricans, Desulfomicrobium baculatum. Desulfobacterium autotrophicum, Desulfuromonas acetoxidans, and Geobacter metallireducens. These organisms produced little or no sulfate from S0 with Fe(III) as a potential electron acceptor or in the absence of an electron acceptor. In detailed studies with Desulfovibrio desulfuricans, the stoichiometry of sulfate and Mn(II) production was consistent with the reaction S0 + 3 MnO2 + 4H+ ???SO42- + 3Mn(II) + 2H2O. None of the organisms evaluated could be grown with S0 as the sole electron donor and Mn(IV) as the electron acceptor. In contrast to the other sulfate reducers evaluated, Desulfobulbus propionicus produced sulfate from S0 in the absence of an electron acceptor and Fe(III) oxide stimulated sulfate production. Sulfide also accumulated in the absence of Mn(IV) or Fe(III). The stoichiometry of sulfate and sulfide production indicated that Desulfobulbus propionicus disproportionates S0 as follows: 4S0 + 4H2O???SO42- + 3HS- + 5 H+. Growth of Desulfobulbus propionicus with S0 as the electron donor and Fe(III) as a sulfide sink and/or electron acceptor was very slow. The S0 oxidation coupled to Mn(IV) reduction described here provides a potential explanation for the Mn(IV)-dependent sulfate production that previous studies have observed in anoxic marine sediments. Desulfobulbus propionicus is the first example of a pure culture known to disproportionate S0.

  3. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  4. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  5. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  6. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  7. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  8. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  17. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  20. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  1. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  2. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  3. Activation and transfer of sulfate in biological systems (1960); Activation biologique du sulfate et son transfert (1960)

    Energy Technology Data Exchange (ETDEWEB)

    Chapeville, F [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1960-07-01

    It examines in this review the successive stages of active sulfate formation and its role in biological synthesis of sulfuric esters. The possible role of active sulfate as intermediary in sulfate reduction is also discussed. (author) [French] On examine dans cette etude les stades successifs de la mise en evidence du sulfate actif, son role dans la formation des esters sulfuriques de natures diverses, ainsi que sa participation eventuelle comme intermediaire au cours de la reduction du sulfate. On decrit aussi un procede de preparation du systeme biologique, generateur du sulfate actif et une methode de synthese chimique. (auteur)

  4. Externalities - an analysis using the EU ExternE-results

    International Nuclear Information System (INIS)

    2003-10-01

    The EU project ExternE quantified the externalities for the different energy technologies. In this work, the ExternE results are used in a MARKAL-analysis for the Nordic countries. The analysis does not go into detail, but gives some interesting indications: The external costs are not fully covered in the Nordic energy systems, the present taxes and charges are not high enough. The emissions from the energy systems would be strongly reduced, if taxes/environmental charges were set at the level ExternE calculate. The emissions from power production would be reduced most. Renewable energy sources and natural gas dominate the energy systems in the ExternE case

  5. Corrosion of Iron by Sulfate-Reducing Bacteria: New Views of an Old Problem

    Science.gov (United States)

    Garrelfs, Julia

    2014-01-01

    About a century ago, researchers first recognized a connection between the activity of environmental microorganisms and cases of anaerobic iron corrosion. Since then, such microbially influenced corrosion (MIC) has gained prominence and its technical and economic implications are now widely recognized. Under anoxic conditions (e.g., in oil and gas pipelines), sulfate-reducing bacteria (SRB) are commonly considered the main culprits of MIC. This perception largely stems from three recurrent observations. First, anoxic sulfate-rich environments (e.g., anoxic seawater) are particularly corrosive. Second, SRB and their characteristic corrosion product iron sulfide are ubiquitously associated with anaerobic corrosion damage, and third, no other physiological group produces comparably severe corrosion damage in laboratory-grown pure cultures. However, there remain many open questions as to the underlying mechanisms and their relative contributions to corrosion. On the one hand, SRB damage iron constructions indirectly through a corrosive chemical agent, hydrogen sulfide, formed by the organisms as a dissimilatory product from sulfate reduction with organic compounds or hydrogen (“chemical microbially influenced corrosion”; CMIC). On the other hand, certain SRB can also attack iron via withdrawal of electrons (“electrical microbially influenced corrosion”; EMIC), viz., directly by metabolic coupling. Corrosion of iron by SRB is typically associated with the formation of iron sulfides (FeS) which, paradoxically, may reduce corrosion in some cases while they increase it in others. This brief review traces the historical twists in the perception of SRB-induced corrosion, considering the presently most plausible explanations as well as possible early misconceptions in the understanding of severe corrosion in anoxic, sulfate-rich environments. PMID:24317078

  6. External costs of electricity

    International Nuclear Information System (INIS)

    Rabl, A.; Spadaro, J.V.

    2005-01-01

    This article presents a synthesis of the ExternE project (External costs of Energy) of the European community about the external costs of power generation. Pollution impacts are calculated using an 'impact pathways' analysis, i.e. an analysis of the emission - dispersion - dose-response function - cost evaluation chain. Results are presented for different fuel cycles (with several technological variants) with their confidence intervals. The environmental impact costs are particularly high for coal: for instance, in France, for coal-fired power plants it is of the same order as the electricity retail price. For natural gas, this cost is about a third of the one for coal. On the contrary, the environmental impact costs for nuclear and renewable energies are low, typically of few per cent of the electricity price. The main part of these costs corresponds to the sanitary impacts, in particular the untimely mortality. In order to avoid any controversy about the cost evaluation of mortality, the reduction of the expectation of life due to the different fuel cycles is also indicated and the risks linked with nuclear energy are presented using several comparisons. (J.S.)

  7. On parabolic external maps

    DEFF Research Database (Denmark)

    Lomonaco, Luna; Petersen, Carsten Lunde; Shen, Weixiao

    2017-01-01

    We prove that any C1+BV degree d ≥ 2 circle covering h having all periodic orbits weakly expanding, is conjugate by a C1+BV diffeomorphism to a metrically expanding map. We use this to connect the space of parabolic external maps (coming from the theory of parabolic-like maps) to metrically expan...

  8. Stochastic Control - External Models

    DEFF Research Database (Denmark)

    Poulsen, Niels Kjølstad

    2005-01-01

    This note is devoted to control of stochastic systems described in discrete time. We are concerned with external descriptions or transfer function model, where we have a dynamic model for the input output relation only (i.e.. no direct internal information). The methods are based on LTI systems...

  9. Sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS ...

    African Journals Online (AJOL)

    Four strains of eri, Samia cynthia ricini Lepidoptera: Saturniidae that can be identified morphologically and maintained at North East Institute of Science and Technology, Jorhat were characterized based on their protein profile by sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS-PAGE) and DNA by random ...

  10. Determination of boron spectrophotometry in thorium sulfate

    International Nuclear Information System (INIS)

    Federgrun, L.; Abrao, A.

    1976-01-01

    A procedure for the determination of microquantities of boron in nuclear grade thorium sulfate is described. The method is based on the extraction of BF - 4 ion associated to monomethylthionine (MMT) in 1,2 - dichloroethane. The extraction of the colored BF - 4 -MMT complex does not allow the presence of sulfuric and phosphoric acids; other anions interfere seriously. This fact makes the dissolution of the thorium sulfate impracticable, since it is insoluble in both acids. On the other hand, the quantitative separation of thorium is mandatory, to avoid the precipitation of ThF 4 . To overcome this difficulty, the thorium sulfate is dissolved using a strong cationic ion exchanger, Th 4+ being totally retained into the resin. Boron is then analysed in the effluent. The procedure allows the determination of 0.2 to 10.0 microgramas of B, with a maximum error of 10%. Thorium sulfate samples with contents of 0.2 to 2.0μg B/gTh have being analysed [pt

  11. Sulfate reducing potential in an estuarine beach

    Digital Repository Service at National Institute of Oceanography (India)

    LokaBharathi, P.A.; Chandramohan, D.

    Sulfate reducing bacteria (SRB) and their activity (SRA) together with total anaerobic and aerobic bacterial flora were estimated during July 1982-April 1983 and July-August 1984 from 1, 3 and 5 cm depths using core samples. The average number (no...

  12. Sulfate-reducing bacteria in anaerobic bioreactors

    NARCIS (Netherlands)

    Oude Elferink, S.J.W.H.

    1998-01-01

    The treatment of industrial wastewaters containing high amounts of easily degradable organic compounds in anaerobic bioreactors is a well-established process. Similarly, wastewaters which in addition to organic compounds also contain sulfate can be treated in this way. For a long time, the

  13. Mechanisms and Effectivity of Sulfate Reducing Bioreactors ...

    Science.gov (United States)

    Mining-influenced water (MIW) is the main environmental challenges associated with the mining industry. Passive MIW remediation can be achieved through microbial activity in sulfate-reducing bioreactors (SRBRs), but their actual removal rates depend on different factors, one of which is the substrate composition. Chitinous materials have demonstrated high metal removal rates, particularly for the two recalcitrant MIW contaminants Zn and Mn, but their removal mechanisms need further study. We studied Cd, Fe, Zn, and Mn removal in bioactive and abiotic SRBRs to elucidate the metal removal mechanisms and the differences in metal and sulfate removal rates using a chitinous material as substrate. We found that sulfate-reducing bacteria are effective in increasing metal and sulfate removal rates and duration of operation in SRBRs, and that the main mechanism involved was metal precipitation as sulfides. The solid residues provided evidence of the presence of sulfides in the bioactive column, more specifically ZnS, according to XPS analysis. The feasibility of passive treatments with a chitinous substrate could be an important option for MIW remediation. Mining influenced water (MIW) remediation is still one of the top priorities for the agency because it addresses the most important environmental problem associated with the mining industry and that affects thousands of communities in the U.S. and worldwide. In this paper, the MIW bioremediation mechanisms are studied

  14. Transmission spectra study of sulfate substituted potassium dihydrogen phosphate

    KAUST Repository

    LI, LIANG; Zhang, Jianqin; Sun, Xun; Zhang, Qiang; Zhao, Xian; Zhang, Xixiang

    2013-01-01

    Potassium dihydrogen phosphate (KDP) crystals with different amounts of sulfate concentration were grown and the transmittance spectrum was studied. A crystal with high sulfate replacement density exhibits heavy absorption property

  15. Bone sialoprotein II synthesized by cultured osteoblasts contains tyrosine sulfate

    International Nuclear Information System (INIS)

    Ecarot-Charrier, B.; Bouchard, F.; Delloye, C.

    1989-01-01

    Isolated mouse osteoblasts that retain their osteogenic activity in culture were incubated with [35S] sulfate. Two radiolabeled proteins, in addition to proteoglycans, were extracted from the calcified matrix of osteoblast cultures. All the sulfate label in both proteins was in the form of tyrosine sulfate as assessed by amino acid analysis and thin layer chromatography following alkaline hydrolysis. The elution behavior on DEAE-Sephacel of the major sulfated protein and the apparent Mr on sodium dodecyl sulfate gels were characteristic of bone sialoprotein II extracted from rat. This protein was shown to cross-react with an antiserum raised against bovine bone sialoprotein II, indicating that bone sialoprotein II synthesized by cultured mouse osteoblasts is a tyrosine-sulfated protein. The minor sulfated protein was tentatively identified as bone sialoprotein I or osteopontin based on its elution properties on DEAE-Sephacel and anomalous behavior on sodium dodecyl sulfate gels similar to those reported for rat bone sialoprotein I

  16. Galactose 6-sulfate sulfatase activity in Morquio syndrome

    International Nuclear Information System (INIS)

    Yutaka, T.; Okada, S.; Kato, T.; Inui, K.; Yabuuhi, H.

    1982-01-01

    The authors have prepared a new substrate, o-β-D-sulfo-galactosyl-(1-4)-β-D-6-sulfo-2-acetamido-2-deoxyglucosyl-(1-4)-D-[1- 3 H]galactitol, from shark cartilage keratan sulfate, for the assay of galactose 6-sulfate sulfatase activity. Using this substrate, they found there was a striking deficiency of galactose 6-sulfate sulfatase activity, in addition to the known deficiency of N-acetylgalactosamine 6-sulfate sulfatase, in the cultured skin fibroblasts of patients with Morquio syndrome. Their results could be explained by the hypothesis that accumulation of keratan sulfate and chondroitin 6-sulfate in Morquio syndrome is due to a deficiency of galactose 6-sulfate sulfatase and N-acetylgalactosamine 6-sulfate sulfatase activity, which are necessary for the degradation of these two mucopolysaccharides. (Auth.)

  17. Galactose 6-sulfate sulfatase activity in Morquio syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Yutaka, T.; Okada, S.; Kato, T.; Inui, K.; Yabuuhi, H. (Osaka Univ. (Japan). Faculty of Medicine)

    1982-07-01

    The authors have prepared a new substrate, o-..beta..-D-sulfo-galactosyl-(1-4)-..beta..-D-6-sulfo-2-acetamido-2-deoxyglucosyl-(1-4)-D-(1-/sup 3/H)galactitol, from shark cartilage keratan sulfate, for the assay of galactose 6-sulfate sulfatase activity. Using this substrate, they found there was a striking deficiency of galactose 6-sulfate sulfatase activity, in addition to the known deficiency of N-acetylgalactosamine 6-sulfate sulfatase, in the cultured skin fibroblasts of patients with Morquio syndrome. Their results could be explained by the hypothesis that accumulation of keratan sulfate and chondroitin 6-sulfate in Morquio syndrome is due to a deficiency of galactose 6-sulfate sulfatase and N-acetylgalactosamine 6-sulfate sulfatase activity, which are necessary for the degradation of these two mucopolysaccharides.

  18. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  19. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  20. Isolation of a sulfate reducing bacterium and its application in sulfate ...

    African Journals Online (AJOL)

    The results show that the effect of C. freundii in removing sulfate was best when the temperature was 32°C, pH was 7.0, COD/SO42- was 5.0 and the initial SO42- concentration was 1500 mg/L. Also, the SRB was inoculated onto an up-flow anaerobic sludge bed (UASB) to remove sulfate in actual tannery wastewater.

  1. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  2. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  3. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  4. Comparison of magnesium sulfate and sodium sulfate for removal of water from pesticide extracts of foods.

    Science.gov (United States)

    Schenck, Frank J; Callery, Patrick; Gannett, Peter M; Daft, Jonathan R; Lehotay, Steven J

    2002-01-01

    Water-miscible solvents, such as acetone and acetonitrile, effectively extract both polar and nonpolar pesticide residues from nonfatty foods. The addition of sodium chloride to the resulting acetonitrile-water or acetone-water extract (salting out) results in the separation of the water from the organic solvent. However, the organic solvent layer (pesticide extract) still contains some residual water, which can adversely affect separation procedures that follow, such as solid-phase extraction and/or gas chromatography. Drying agents, such as sodium sulfate or magnesium sulfate, are used to remove the water from the organic extracts. In the present study, we used nuclear magnetic resonance spectroscopy to study the composition of the phases resulting from salting out and to compare the effectiveness of sodium sulfate and magnesium sulfate as drying agents. The study showed that considerable amounts of water remained in the organic phase after phase separation. Sodium sulfate was a relatively ineffective drying agent, removing little or no residual water from the organic solvent. Magnesium sulfate proved to be a much more effective drying agent.

  5. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  6. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  7. ExternE transport methodology for external cost evaluation of air pollution

    DEFF Research Database (Denmark)

    Jensen, S. S.; Berkowicz, R.; Brandt, J.

    The report describes how the human exposure estimates based on NERI's human exposure modelling system (AirGIS) can improve the Danish data used for exposure factors in the ExternE Transport methodology. Initially, a brief description of the ExternE Tranport methodology is given and it is summarised...

  8. Checklists for external validity

    DEFF Research Database (Denmark)

    Dyrvig, Anne-Kirstine; Kidholm, Kristian; Gerke, Oke

    2014-01-01

    to an implementation setting. In this paper, currently available checklists on external validity are identified, assessed and used as a basis for proposing a new improved instrument. METHOD: A systematic literature review was carried out in Pubmed, Embase and Cinahl on English-language papers without time restrictions....... The retrieved checklist items were assessed for (i) the methodology used in primary literature, justifying inclusion of each item; and (ii) the number of times each item appeared in checklists. RESULTS: Fifteen papers were identified, presenting a total of 21 checklists for external validity, yielding a total...... of 38 checklist items. Empirical support was considered the most valid methodology for item inclusion. Assessment of methodological justification showed that none of the items were supported empirically. Other kinds of literature justified the inclusion of 22 of the items, and 17 items were included...

  9. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  10. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  11. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  12. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Acid Sulfate Alteration in Gusev Crater, Mars

    Science.gov (United States)

    Morris, R. V.; Ming, D. W.; Catalano, J. G.

    2016-01-01

    The Mars Exploration Rover (MER) Spirit landed on the Gusev Crater plains west of the Columbia Hills in January, 2004, during the Martian summer (sol 0; sol = 1 Martian day = 24 hr 40 min). Spirit explored the Columbia Hills of Gusev Crater in the vicinity of Home Plate at the onset on its second winter (sol approximately 900) until the onset of its fourth winter (sol approximately 2170). At that time, Spirit became mired in a deposit of fined-grained and sulfate-rich soil with dust-covered solar panels and unfavorable pointing of the solar arrays toward the sun. Spirit has not communicated with the Earth since sol 2210 (January, 2011). Like its twin rover Opportunity, which landed on the opposite side of Mars at Meridiani Planum, Spirit has an Alpha Particle X-Ray Spectrometer (APXS) instrument for chemical analyses and a Moessbauer spectrometer (MB) for measurement of iron redox state, mineralogical speciation, and quantitative distribution among oxidation (Fe(3+)/sigma Fe) and coordination (octahedral versus tetrahedral) states and mineralogical speciation (e.g., olivine, pyroxene, ilmenite, carbonate, and sulfate). The concentration of SO3 in Gusev rocks and soils varies from approximately 1 to approximately 34 wt%. Because the APXS instrument does not detect low atomic number elements (e.g., H and C), major-element oxide concentrations are normalized to sum to 100 wt%, i.e., contributions of H2O, CO2, NO2, etc. to the bulk composition care not considered. The majority of Gusev samples have approximately 6 plus or minus 5 wt% SO3, but there is a group of samples with high SO3 concentrations (approximately 30 wt%) and high total iron concentrations (approximately 20 wt%). There is also a group with low total Fe and SO3 concentrations that is also characterized by high SiO2 concentrations (greater than 70 wt%). The trend labeled "Basaltic Soil" is interpreted as mixtures in variable proportions between unaltered igneous material and oxidized and SO3-rich basaltic

  14. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  15. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  16. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  17. Perceived family social support buffers against the effects of exposure to rocket attacks on adolescent depression, aggression, and severe violence.

    Science.gov (United States)

    Shahar, Golan; Henrich, Christopher C

    2016-02-01

    The authors compared the protective effects of 3 sources of perceived social support-from family members, friends, and school personnel-on internalizing and externalizing symptoms in adolescents exposed to rocket attacks. Data were based on 362 Israeli adolescents (median age = 14), chronically exposed to rockets from the Gaza Strip, for whom robust effects of exposure on internalizing and externalizing symptoms were reported during the 2009-2010 period (Henrich & Shahar, 2013). New analyses revealed that perceived family social support assessed in 2009 buffered against the effect of exposure to rocket attacks on depression, aggression, and severe violence during 2009-2010. Findings are consistent with a human-ecological perspective exposure to political violence and encourage the employment of family-based preventive interventions in afflicted areas. (c) 2016 APA, all rights reserved).

  18. Constraining Δ33S signatures of Archean seawater sulfate with carbonate-associated sulfate

    Science.gov (United States)

    Peng, Y.; Bao, H.; Bekker, A.; Hofmann, A.

    2017-12-01

    Non-mass dependent sulfur isotope deviation of S-bearing phases in Archean sedimentary strata, and expressed as Δ33S, has a consistent pattern, i.e., sulfide (pyrite) predominantly bear positive Δ33S values, while Paleoarchean sulfate (barite) has negative Δ33S values. This pattern was later corroborated by observations of negative Δ33S values in Archean volcanogenic massive sulfide deposits and negative Δ33S values in early diagenetic nodular pyrite with a wide range of δ34S values, which is thought to be due to microbial sulfate reduction. These signatures have provided a set of initial conditions for a mechanistic interpretation at physical chemistry level. Unlike the younger geological times when large bodies of seawater evaporite deposits are common, to expand seawater sulfate records, carbonate-associated sulfate (CAS) was utilized as a proxy for ancient seawater sulfate. CAS extracted from the Archean carbonates carries positive Δ33S values. However, CAS could be derived from pyrite oxidation following exposure to modern oxidizing conditions and/or during laboratory extraction procedures. It is, therefore, important for us understanding context of the overall early earth atmospheric condition to empirically confirm whether Archean seawater sulfate was generally characterized by negative Δ33S signatures. Combined δ18O, Δ17O, δ34S, and Δ33S analyses of sequentially extracted water-leachable sulfate (WLS) and acid-leachable sulfate (ALS = CAS) and δ34S and Δ33S analyses of pyrite can help to identify the source of extracted sulfate. We studied drill-core samples of Archean carbonates from the 2.55 Ga Malmani and Campell Rand supgroups, South Africa. Our preliminary results show that 1) neither WLS nor ALS were extracted from samples with extremely low pyrite contents (less than 0.05 wt.%); 2) extractable WLS and ALS is present in samples with relatively high pyrite contents (more than 1 wt.%), and that δ34S and Δ33S values of WLS, ALS, and

  19. High rates of sulfate reduction in a low-sulfate hot spring microbial mat are driven by a low level of diversity of sulfate-respiring microorganisms

    DEFF Research Database (Denmark)

    Dillon, Jesse G; Fishbain, Susan; Miller, Scott R

    2007-01-01

    The importance of sulfate respiration in the microbial mat found in the low-sulfate thermal outflow of Mushroom Spring in Yellowstone National Park was evaluated using a combination of molecular, microelectrode, and radiotracer studies. Despite very low sulfate concentrations, this mat community...... was shown to sustain a highly active sulfur cycle. The highest rates of sulfate respiration were measured close to the surface of the mat late in the day when photosynthetic oxygen production ceased and were associated with a Thermodesulfovibrio-like population. Reduced activity at greater depths...... was correlated with novel populations of sulfate-reducing microorganisms, unrelated to characterized species, and most likely due to both sulfate and carbon limitation....

  20. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  1. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  2. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Effects of sulfate chitosan derivatives on nonalcoholic fatty liver disease

    Science.gov (United States)

    Yu, Mingming; Wang, Yuanhong; Jiang, Tingfu; Lv, Zhihua

    2014-06-01

    Sulfate chitosan derivatives have good solubility and therapeutic effect on the cell model of NAFLD. The aim of this study was to examine the therapeutic effect of sulfate chitosan derivatives on NAFLD. The male Wistar rats were orally fed high fat emulsion and received sulfate chitosan derivatives for 5 weeks to determine the pre-treatment effect of sulfate chitosan derivatives on NAFLD. To evaluate the therapeutic effect of sulfate chitosan derivatives on NAFLD, the rats were orally fed with high concentration emulsion for 5 weeks, followed by sulfate chitosan derivatives for 3 weeks. Histological analysis and biomedical assays showed that sulfate chitosan derivatives can dramatically prevent the development of hepatic steatosis in hepatocyte cells. In animal studies, pre-treatment and treatment with sulfate chitosan derivatives significantly protected against hepatic steatohepatitis induced by high fat diet according to histological analysis. Furthermore, increased TC, ALT, MDA, and LEP in NAFLD were significantly ameliorated by pre-treatment and treatment with sulfate chitosan derivatives. Furthermore, increased TG, AST, and TNF-α in NAFLD were significantly ameliorated by treatment with sulfate chitosan derivatives. Sulfate chitosan derivatives have good pre-treatment and therapeutic effect on NAFLD.

  5. Chinese hamster ovary cell mutants defective in heparan sulfate biosynthesis

    International Nuclear Information System (INIS)

    Bame, K.J.; Kiser, C.S.; Esko, J.D.

    1987-01-01

    The authors have isolated Chinese hamster ovary cell mutants defective in proteoglycan synthesis by radiographic screening for cells unable to incorporate 35 SO 4 into acid-precipitable material. Some mutants did not incorporate 35 SO 4 into acid-precipitable material, whereas others incorporated about 3-fold less radioactivity. HPLC anion exchange chromatographic analysis of radiolabelled glycosaminoglycans isolated from these mutants revealed many are defective in heparan sulfate biosynthesis. Mutants 803 and 677 do not synthesize heparan sulfate, although they produce chondroitin sulfate: strain 803 makes chondroitin sulfate normally, whereas 677 overaccumulates chondroitin sulfate by a factor of three. These mutants fall into the same complementation group, suggesting that the mutations are allelic. A second group of heparan sulfate biosynthetic mutants, consisting of cell lines 625, 668 and 679, produce undersulfated heparan sulfate and normal chondroitin sulfate. Treatment of the chains with nitrous acid should determine the position of the sulfate groups along the chain. These mutants may define a complementation group that is defective in the enzymes which modify the heparan sulfate chain. To increase the authors repertoire of heparan sulfate mutants, they are presently developing an in situ enzyme assay to screen colonies replica plated on filter discs for sulfotransferase defects

  6. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  7. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  9. Thermophilic Sulfate-Reducing Bacteria in Cold Marine Sediment

    DEFF Research Database (Denmark)

    ISAKSEN, MF; BAK, F.; JØRGENSEN, BB

    1994-01-01

    sulfate-reducing bacteria was detected. Time course experiments showed constant sulfate reduction rates at 4 degrees C and 30 degrees C, whereas the activity at 60 degrees C increased exponentially after a lag period of one day. Thermophilic, endospore-forming sulfate-reducing bacteria, designated strain...... C to search for presence of psychrophilic, mesophilic and thermophilic sulfate-reducing bacteria. Detectable activity was initially only in the mesophilic range, but after a lag phase sulfate reduction by thermophilic sulfate-reducing bacteria were observed. No distinct activity of psychrophilic...... P60, were isolated and characterized as Desulfotomaculum kuznetsovii. The temperature response of growth and respiration of strain P60 agreed well with the measured sulfate reduction at 50 degrees-70 degrees C. Bacteria similar to strain P60 could thus be responsible for the measured thermophilic...

  10. DEPENDENCY OF SULFATE SOLUBILITY ON MELT COMPOSITION AND MELT POLYMERIZATION

    International Nuclear Information System (INIS)

    JANTZEN, CAROL M.

    2004-01-01

    Sulfate and sulfate salts are not very soluble in borosilicate waste glass. When sulfate is present in excess it can form water soluble secondary phases and/or a molten salt layer (gall) on the melt pool surface which is purported to cause steam explosions in slurry fed melters. Therefore, sulfate can impact glass durability while formation of a molten salt layer on the melt pool can impact processing. Sulfate solubility has been shown to be compositionally dependent in various studies, (e.g. , B2O3, Li2O, CaO, MgO, Na2O, and Fe2O3 were shown to increase sulfate solubility while Al2O3 and SiO2 decreased sulfate solubility). This compositional dependency is shown to be related to the calculated melt viscosity at various temperatures and hence the melt polymerization

  11. Chondroitin-4-sulfation negatively regulates axonal guidance and growth

    Science.gov (United States)

    Wang, Hang; Katagiri, Yasuhiro; McCann, Thomas E.; Unsworth, Edward; Goldsmith, Paul; Yu, Zu-Xi; Tan, Fei; Santiago, Lizzie; Mills, Edward M.; Wang, Yu; Symes, Aviva J.; Geller, Herbert M.

    2008-01-01

    Summary Glycosaminoglycan (GAG) side chains endow extracellular matrix proteoglycans with diversity and complexity based upon the length, composition, and charge distribution of the polysaccharide chain. Using cultured primary neurons, we show that specific sulfation in the GAG chains of chondroitin sulfate (CS) mediates neuronal guidance cues and axonal growth inhibition. Chondroitin-4-sulfate (CS-A), but not chondroitin-6-sulfate (CS-C), exhibits a strong negative guidance cue to mouse cerebellar granule neurons. Enzymatic and gene-based manipulations of 4-sulfation in the GAG side chains alter their ability to direct growing axons. Furthermore, 4-sulfated CS GAG chains are rapidly and significantly increased in regions that do not support axonal regeneration proximal to spinal cord lesions in mice. Thus, our findings provide the evidence showing that specific sulfation along the carbohydrate backbone carries instructions to regulate neuronal function. PMID:18768934

  12. Thermophilic Sulfate-Reducing Bacteria in Cold Marine Sediment

    DEFF Research Database (Denmark)

    ISAKSEN, MF; BAK, F.; JØRGENSEN, BB

    1994-01-01

    C to search for presence of psychrophilic, mesophilic and thermophilic sulfate-reducing bacteria. Detectable activity was initially only in the mesophilic range, but after a lag phase sulfate reduction by thermophilic sulfate-reducing bacteria were observed. No distinct activity of psychrophilic...... sulfate-reducing bacteria was detected. Time course experiments showed constant sulfate reduction rates at 4 degrees C and 30 degrees C, whereas the activity at 60 degrees C increased exponentially after a lag period of one day. Thermophilic, endospore-forming sulfate-reducing bacteria, designated strain...... P60, were isolated and characterized as Desulfotomaculum kuznetsovii. The temperature response of growth and respiration of strain P60 agreed well with the measured sulfate reduction at 50 degrees-70 degrees C. Bacteria similar to strain P60 could thus be responsible for the measured thermophilic...

  13. Sulfate and acid resistant concrete and mortar

    Science.gov (United States)

    Liskowitz, John W.; Wecharatana, Methi; Jaturapitakkul, Chai; Cerkanowicz, deceased, Anthony E.

    1998-01-01

    The present invention relates to concrete, mortar and other hardenable mixtures comprising cement and fly ash for use in construction and other applications, which hardenable mixtures demonstrate significant levels of acid and sulfate resistance while maintaining acceptable compressive strength properties. The acid and sulfate hardenable mixtures of the invention containing fly ash comprise cementitious materials and a fine aggregate. The cementitous materials may comprise fly ash as well as cement. The fine aggregate may comprise fly ash as well as sand. The total amount of fly ash in the hardenable mixture ranges from about 60% to about 120% of the total amount of cement, by weight, whether the fly ash is included as a cementious material, fine aggregate, or an additive, or any combination of the foregoing. In specific examples, mortar containing 50% fly ash and 50% cement in cementitious materials demonstrated superior properties of corrosion resistance.

  14. Biosynthesis and function of chondroitin sulfate.

    Science.gov (United States)

    Mikami, Tadahisa; Kitagawa, Hiroshi

    2013-10-01

    Chondroitin sulfate proteoglycans (CSPGs) are principal pericellular and extracellular components that form regulatory milieu involving numerous biological and pathophysiological phenomena. Diverse functions of CSPGs can be mainly attributed to structural variability of their polysaccharide moieties, chondroitin sulfate glycosaminoglycans (CS-GAG). Comprehensive understanding of the regulatory mechanisms for CS biosynthesis and its catabolic processes is required in order to understand those functions. Here, we focus on recent advances in the study of enzymatic regulatory pathways for CS biosynthesis including successive modification/degradation, distinct CS functions, and disease phenotypes that have been revealed by perturbation of the respective enzymes in vitro and in vivo. Fine-tuned machineries for CS production/degradation are crucial for the functional expression of CS chains in developmental and pathophysiological processes. Control of enzymes responsible for CS biosynthesis/catabolism is a potential target for therapeutic intervention for the CS-associated disorders. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Population-based study of ABCD2 score, carotid stenosis, and atrial fibrillation for early stroke prediction after transient ischemic attack: the North Dublin TIA study.

    LENUS (Irish Health Repository)

    Sheehan, Orla C

    2010-05-01

    Transient ischemic attack (TIA) etiologic data and the ABCD(2) score may improve early stroke risk prediction, but studies are required in population-based cohorts. We investigated the external validity of the ABCD(2) score, carotid stenosis, and atrial fibrillation for prediction of early recurrent stroke after TIA.

  16. Regional transport model of atmospheric sulfates

    International Nuclear Information System (INIS)

    Rao, K.S.; Thomson, I.; Egan, B.A.

    1977-01-01

    As part of the Sulfate Regional Experiment (SURE) Design Project, a regional transport model of atmospheric sulfates has been developed. This quasi-Lagrangian three-dimensional grid numerical model uses a detailed SO 2 emission inventory of major anthropogenic sources in the Eastern U.S. region, and observed meteorological data during an episode as inputs. The model accounts for advective transport and turbulent diffusion of the pollutants. The chemical transformation of SO 2 and SO 4 /sup =/ and the deposition of the species at the earth's surface are assumed to be linear processes at specified constant rates. The numerical model can predict the daily average concentrations of SO 2 and SO 4 /sup =/ at all receptor locations in the grid region during the episode. Because of the spatial resolution of the grid, this model is particularly suited to investigate the effect of tall stacks in reducing the ambient concentration levels of sulfur pollutants. This paper presents the formulations and assumptions of the regional sulfate transport model. The model inputs and results are discussed. Isopleths of predicted SO 2 and SO 4 /sup =/ concentrations are compared with the observed ground level values. The bulk of the information in this paper is directed to air pollution meteorologists and environmental engineers interested in the atmospheric transport modeling studies of sulfur oxide pollutants

  17. Sulfation and cation effects on the conformational properties of the glycan backbone of chondroitin sulfate disaccharides.

    Science.gov (United States)

    Faller, Christina E; Guvench, Olgun

    2015-05-21

    Chondroitin sulfate (CS) is one of several glycosaminoglycans that are major components of proteoglycans. A linear polymer consisting of repeats of the disaccharide -4GlcAβ1-3GalNAcβ1-, CS undergoes differential sulfation resulting in five unique sulfation patterns. Because of the dimer repeat, the CS glycosidic "backbone" has two distinct sets of conformational degrees of freedom defined by pairs of dihedral angles: (ϕ1, ψ1) about the β1-3 glycosidic linkage and (ϕ2, ψ2) about the β1-4 glycosidic linkage. Differential sulfation and the possibility of cation binding, combined with the conformational flexibility and biological diversity of CS, complicate experimental efforts to understand CS three-dimensional structures at atomic resolution. Therefore, all-atom explicit-solvent molecular dynamics simulations with Adaptive Biasing Force sampling of the CS backbone were applied to obtain high-resolution, high-precision free energies of CS disaccharides as a function of all possible backbone geometries. All 10 disaccharides (β1-3 vs β1-4 linkage × five different sulfation patterns) were studied; additionally, ion effects were investigated by considering each disaccharide in the presence of either neutralizing sodium or calcium cations. GlcAβ1-3GalNAc disaccharides have a single, broad, thermodynamically important free-energy minimum, whereas GalNAcβ1-4GlcA disaccharides have two such minima. Calcium cations but not sodium cations bind to the disaccharides, and binding is primarily to the GlcA -COO(-) moiety as opposed to sulfate groups. This binding alters the glycan backbone thermodynamics in instances where a calcium cation bound to -COO(-) can act to bridge and stabilize an interaction with an adjacent sulfate group, whereas, in the absence of this cation, the proximity of a sulfate group to -COO(-) results in two like charges being both desolvated and placed adjacent to each other and is found to be destabilizing. In addition to providing information

  18. Purification and sequence characterization of chondroitin sulfate and dermatan sulfate from fishes.

    Science.gov (United States)

    Lin, Na; Mo, Xiaoli; Yang, Yang; Zhang, Hong

    2017-04-01

    Chondroitin sulfate (CS) and dermatan sulfate (DS) were extracted and purified from skins or bones of salmon (Salmo salar), snakehead (Channa argus), monkfish (Lophius litulon) and skipjack tuna (Katsuwonus pelamis). Size, structural sequences and sulfate groups of oligosaccharides in the purified CS and DS could be characterized and identified using high performance liquid chromatography (HPLC) combined with Orbitrap mass spectrometry. CS and DS chain structure varies depending on origin, but motif structure appears consistent. Structures of CS and DS oligosaccharides with different size and sulfate groups were compared between fishes and other animals, and results showed that some minor differences of special structures could be identified by hydrophilic interaction chromatography-liquid chromatography-fourier transform-mass/mass spectrometry (HILIC-LC-FT-MS/MS). For example, data showed that salmon and skipjack CS had a higher percentage content of high-level sulfated oligosaccharides than that porcine CS. In addition, structural information of different origins of CS and DS was analyzed by principal component analysis (PCA) and results showed that CS and DS samples could be differentiated according to their molecular conformation and oligosaccharide fragments information. Understanding CS and DS structure derived from different origins may lead to the production of CS or DS with unique disaccharides or oligosaccharides sequence composition and biological functions.

  19. Environmental external effects from wind power based on the EU ExternE methodology

    DEFF Research Database (Denmark)

    Ibsen, Liselotte Schleisner; Nielsen, Per Sieverts

    1998-01-01

    of the Danish part of the project is to implement the framework for externality evaluation, for three different power plants located in Denmark. The paper will focus on the assessment of the impacts of the whole fuel cycles for wind, natural gas and biogas. Priority areas for environmental impact assessment......The European Commission has launched a major study project, ExternE, to develop a methodology to quantify externalities. A “National Implementation Phase”, was started under the Joule II programme with the purpose of implementing the ExternE methodology in all member states. The main objective...

  20. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  1. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  2. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  3. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  4. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  5. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  6. External corners as heat bridges

    Energy Technology Data Exchange (ETDEWEB)

    Berber, J.

    1984-08-01

    The maximum additional heat loss in vertical external corners depending on wall thickness is determined. In order to amire at a low k-value, a much smaller wall thickness is required in externally insulated walls than in monolithic constructions; the greater loss of heat bridge with external insulation stands in contrast to a higher loss in thick, monolithic walls. In relation to total losses, the additional losses through external corners are practically negligible.

  7. [External pancreatic fistulas management].

    Science.gov (United States)

    Stepan, E V; Ermolov, A S; Rogal', M L; Teterin, Yu S

    The main principles of treatment of external postoperative pancreatic fistulas are viewed in the article. Pancreatic trauma was the reason of pancreatic fistula in 38.7% of the cases, operations because of acute pancreatitis - in 25.8%, and pancreatic pseudocyst drainage - in 35.5%. 93 patients recovered after the treatment. Complex conservative treatment of EPF allowed to close fistulas in 74.2% of the patients with normal patency of the main pancreatic duct (MPD). The usage of octreotide 600-900 mcg daily for at least 5 days to decrease pancreatic secretion was an important part of the conservative treatment. Endoscopic papillotomy was performed in patients with major duodenal papilla obstruction and interruption of transporting of pancreatic secretion to duodenum. Stent of the main pancreatic duct was indicated in patients with extended pancreatic duct stenosis to normalize transport of pancreatic secretion to duodenum. Surgical formation of anastomosis between distal part of the main pancreatic duct and gastro-intestinal tract was carried out when it was impossible to fulfill endoscopic stenting of pancreatic duct either because of its interruption and diastasis between its ends, or in the cases of unsuccessful conservative treatment of external pancreatic fistula caused by drainage of pseudocyst.

  8. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  9. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  11. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  12. Heritability and clinical determinants of serum indoxyl sulfate and p-cresyl sulfate, candidate biomarkers of the human microbiome enterotype.

    Directory of Open Access Journals (Sweden)

    Liesbeth Viaene

    Full Text Available BACKGROUND: Indoxyl sulfate and p-cresyl sulfate are unique microbial co-metabolites. Both co-metabolites have been involved in the pathogenesis of accelerated cardiovascular disease and renal disease progression. Available evidence suggests that indoxyl sulfate and p-cresyl sulfate may be considered candidate biomarkers of the human enterotype and may help to explain the link between diet and cardiovascular disease burden. OBJECTIVE AND DESIGN: Information on clinical determinants and heritability of indoxyl sulfate and p-cresyl sulfate serum is non-existing. To clarify this issue, the authors determined serum levels of indoxyl sulfate and p-cresyl sulfate in 773 individuals, recruited in the frame of the Flemish Study on Environment, Genes and Health Outcomes (FLEMENGHO study. RESULTS: Serum levels of indoxyl sulfate and p-cresyl sulfate amounted to 3.1 (2.4-4.3 and 13.0 (7.4-21.5 μM, respectively. Regression analysis identified renal function, age and sex as independent determinants of both co-metabolites. Both serum indoxyl sulfate (h2 = 0.17 and p-cresyl sulfate (h2 = 0.18 concentrations showed moderate but significant heritability after adjustment for covariables, with significant genetic and environmental correlations for both co-metabolites. LIMITATIONS: Family studies cannot provide conclusive evidence for a genetic contribution, as confounding by shared environmental effects can never be excluded. CONCLUSIONS: The heritability of indoxyl sulfate and p-cresyl sulfate is moderate. Besides genetic host factors and environmental factors, also renal function, sex and age influence the serum levels of these co-metabolites.

  13. Assessment and testing of industrial devices robustness against cyber security attacks

    International Nuclear Information System (INIS)

    Tilaro, F.; Copy, B.

    2012-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. CERN - in collaboration with Siemens - has designed and implemented a dedicated working environment, the Test-bench for Robustness of Industrial Equipment. Such tests attempt to detect possible anomalies by exploiting corrupt communication channels and manipulating the normal behavior of the communication protocols, in the same way as a cyber attacker would proceed. Our approach consists of analyzing protocol implementations by injecting malformed PDUs (Protocol Data Unit) to corrupt the normal behaviour of the system. As a PDU typically has many fields, the number of possible syntactically faulty PDUs grows exponentially with the number of fields. In this document, we proposed a strategy to explore this huge test domain using a hybrid approach of fuzzing and syntax techniques, specifically developed to evaluate industrial device communication robustness. So far, not all the tests can be integrated into automatic tools, human analysis and management is necessary to discover and investigate specific possible failures

  14. Investigating the effect of externalizing perspectives on cognitives biases

    DEFF Research Database (Denmark)

    Madsen, Fredrik Huitfeldt; Hicks, David L., David

    2007-01-01

    of intelligence analysis. We propose that complexity of maintaining multiple different perspectives the same data is one of the reasons for this. We further propose that a tool that facillitates the externalization multiple perspectives would reduce these biases and hence increase the overall quality...... the number of attacks that “get through”. There are many subproblems of this main problem, one of which is that relative quality of the intelligence analysis is too low [39, We observe that the analysts suffer from cognitive biases, and we assume that this is one of the reasons behind “low” quality...... of intelligence analyses....

  15. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  16. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  17. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  18. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  19. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  20. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  1. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  2. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  3. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  4. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  5. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  6. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  7. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  8. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  9. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  10. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  11. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  12. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  13. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  14. Sulfation pattern of fucose branches affects the anti-hyperlipidemic activities of fucosylated chondroitin sulfate.

    Science.gov (United States)

    Wu, Nian; Zhang, Yu; Ye, Xingqian; Hu, Yaqin; Ding, Tian; Chen, Shiguo

    2016-08-20

    Fucosylated chondroitin sulfates (fCSs) are glycosaminoglycans extracted from sea cucumbers, consisting of chondroitin sulfate E (CSE) backbones and sulfated fucose branches. The biological properties of fCSs could be affected by the sulfation pattern of their fucose branches. In the present study, two fCSs were isolated from sea cucumbers Isostichopus badionotus (fCS-Ib) and Pearsonothuria graeffei (fCS-Pg). Their monosaccharide compositions of glucuronic acid (GlcA), N-acetylgalactosamine (GalNAc), fucose (Fuc) and sulfate were at similar molar ratio with 1.0/0.7/0.9/3.1 for fCS-Ib and 1.0/0.8/1.5/2.6 for fCS-Pg. The two fCSs have different sulfation patterns on their fucose branches, fCS-Pg with 3,4-O-disulfation while fCS-Ib with 2,4-O-disulfation. Their antihyperlipidemic effects were compared using a high-fat high-fructose diet (HFFD)-fed C57BL/6J mice model. Both fCS-Ib and fCS-Pg had significant effects on lipid profile improvement, liver protection, blood glucose diminution and hepatic glycogen synthesis. Specifically, fCS-Pg with 3,4-O-disulfation fucose branches was more effective in reduction of blood cholesterol (TC), low density lipoprotein (LDL) and atherogenic index (AI). Our results indicate that both fCSs, especially fCS-Pg, could be used as a potential anti-hyperlipidemic drug. Copyright © 2016. Published by Elsevier Ltd.

  15. A potential role for chondroitin sulfate/dermatan sulfate in arm regeneration in Amphiura filiformis.

    Science.gov (United States)

    Ramachandra, Rashmi; Namburi, Ramesh B; Dupont, Sam T; Ortega-Martinez, Olga; van Kuppevelt, Toin H; Lindahl, Ulf; Spillmann, Dorothe

    2017-05-01

    Glycosaminoglycans (GAGs), such as chondroitin sulfate (CS) and dermatan sulfate (DS) from various vertebrate and invertebrate sources are known to be involved in diverse cellular mechanisms during repair and regenerative processes. Recently, we have identified CS/DS as the major GAG in the brittlestar Amphiura filiformis, with high proportions of di- and tri-O-sulfated disaccharide units. As this echinoderm is known for its exceptional regeneration capacity, we aimed to explore the role of these GAG chains during A. filiformis arm regeneration. Analysis of CS/DS chains during the regeneration process revealed an increase in the proportion of the tri-O-sulfated disaccharides. Conversely, treatment of A. filiformis with sodium chlorate, a potent inhibitor of sulfation reactions in GAG biosynthesis, resulted in a significant reduction in arm growth rates with total inhibition at concentrations higher than 5 mM. Differentiation was less impacted by sodium chlorate exposure or even slightly increased at 1-2 mM. Based on the structural changes observed during arm regeneration we identified chondroitin synthase, chondroitin-4-O-sulfotransferase 2 and dermatan-4-O-sulfotransferase as candidate genes and sought to correlate their expression with the expression of the A. filiformis orthologue of bone morphogenetic factors, AfBMP2/4. Quantitative amplification by real-time PCR indicated increased expression of chondroitin synthase and chondroitin-4-O-sulfotransferase 2, with a corresponding increase in AfBMP2/4 during regeneration relative to nonregenerating controls. Our findings suggest that proper sulfation of GAGs is important for A. filiformis arm regeneration and that these molecules may participate in mechanisms controlling cell proliferation. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Lack of effect of zinc sulfate on wheezing after bronchiolitis in infants less than two years

    Directory of Open Access Journals (Sweden)

    R Abasi

    2014-10-01

    Full Text Available Backgrounds & aim: Wheezing after bronchiolitis is known as a risk factor for asthma. No cure or effective vaccine has been identified for such disease. The purpose of this study was to determine the effects of zinc sulfate on persistent wheezing after bronchiolitis in infants less than two years. Methods: The present randomized clinical trial study was conducted on 90 infants under two years of age suffering from the first attack with a clinical diagnosis of bronchiolitis wheezing hospitalized in Imam Sajjad Hospital, Yasuj. All infants were equally placed in test groups and control group. In addition to bronchiolitis usual treatment, test group received 20 mg of elemental zinc for seven days. Patient information including risk factors associated with wheezing and persistent wheezing were compared 48 hours and two weeks after treatment. Data were analyzed using chi-square and t tests. Results: In all 90 infants diagnosed with bronchiolitis, wheezing was observed. After 48 hours and two weeks wheezing was continued in 67 patients (74.4% and 54 patients (60% respectively Conclusion: The results showed Zinc sulfate had no effect on the improvement of wheezing after bronchiolitis.

  17. Corrosion of Alloy 690 process pot by sulfate containing high level radioactive waste at feed stage

    International Nuclear Information System (INIS)

    Sengupta, P.; Soudamini, N.; Kaushik, C.P.; Jagannath; Mishra, R.K.; Kale, G.B.; Raj, K.; Das, D.; Sharma, B.P.

    2008-01-01

    Prolonged exposure of Alloy 690 process pot to sulfate containing high level radioactive waste leads to (a) depletion of Cr from the alloy, (b) intergranular attack and (c) building up of Cr 2 O 3 -Ni 2 O 3 -Fe 2 O 3 mixed oxide surface layer containing Na and Cs sulfate precipitates. Time dependence of material loss from Alloy 690 is found to follow a linear relationship of the type Δw (material loss) = -7.05 + 0.05t. Corrosion rate calculated for 2400 h exposure is 3.66 mpy. Cr and Ni leach rates obtained for the same sample are 1.61 g m -2 d -1 and 2.52 g m -2 d -1 , respectively. Ni leach rates followed a linear time dependence relationship of the type dNL Ni /dt (leach rate) = -0.09 + 0.027t, whereas Cr leach rates obeyed a non-linear relationship of the type dNL Cr /dt (leach rate) = 0.241 + 0.027t - 1.33 x 10 -4 t 1/2

  18. Corrosion of Alloys 600 ampersand 900 in acidified sulfate and chloride solutions

    International Nuclear Information System (INIS)

    Cullen, W.H.; Partridge, M.J.; Paine, J.P.N.

    1993-01-01

    A program is being performed currently: (1) to better quantify the susceptibility of Alloy 600 and 690 steam generator (SG) tubing materials to intergranular attack (IGA) and intergranular stress corrosion cracking (IGSCC) in acid solutions of the types that could concentrate in steam generator crevices, and (2) to establish the effectiveness of various remedial measures achieved through chemical additions to the secondary side coolant. The main test method is the exposure of stressed C-rings and expanded capsules of SG tubing to acid chloride and sulfate environments of various pH levels, temperatures, and applied potentials. Following these exposures, crack lengths are measured on metallographic cross-sections of the C-rings, and wastage rates calculated from weight loss, surface area and time. Test solutions are based on varying concentrations of sulfate and chloride species, with other contaminants added to some tests. The temperature dependence of the pH of the acidified solutions is calculated using the EPRI-developed MULTEQ computer program. High-temperature pH levels range from values of 2.5 to 7.6 at 315 degrees C, which is the nominal test temperature. Various accelerating and inhibiting factors (pH, temperature, solution composition and concentration, and applied electrochemical potential) are being evaluated

  19. On the roles and regulation of chondroitin sulfate and heparan sulfate in zebrafish pharyngeal cartilage morphogenesis

    DEFF Research Database (Denmark)

    Holmborn, Katarina; Habicher, Judith; Kasza, Zsolt

    2012-01-01

    The present study addresses the roles of heparan sulfate (HS) proteoglycans and chondroitin sulfate (CS) proteoglycans in the development of zebrafish pharyngeal cartilage structures. uxs1 and b3gat3 mutants, predicted to have impaired biosynthesis of both HS and CS because of defective formation...... levels of CS than control larvae, whereas morpholino-mediated suppression of csgalnact1/csgalnact2 resulted in increased HS biosynthesis. Thus, the balance of the Extl3 and Csgalnact1/Csgalnact2 proteins influences the HS/CS ratio. A characterization of the pharyngeal cartilage element morphologies...

  20. Effects of sulfate deprivation on the production of chondroitin/dermatan sulfate by cultures of skin fibroblasts from normal and diabetic individuals

    International Nuclear Information System (INIS)

    Silbert, C.K.; Humphries, D.E.; Palmer, M.E.; Silbert, J.E.

    1991-01-01

    Human skin fibroblast monolayer cultures from two normal men, three Type I diabetic men, and one Type I diabetic woman were incubated with [3H]glucosamine in the presence of diminished concentrations of sulfate. Although total synthesis of [3H]chondroitin/dermatan glycosaminoglycans varied somewhat between cell lines, glycosaminoglycan production was not affected within any line when sulfate levels were decreased from 0.3 mM to 0.06 mM to 0.01 mM to 0 added sulfate. Lowering of sulfate concentrations resulted in diminished sulfation of chondroitin/dermatan in a progressive manner, so that overall sulfation dropped to as low as 19% for one of the lines. Sulfation of chondroitin to form chondroitin 4-sulfate and chondroitin 6-sulfate was progressively and equally affected by decreasing the sulfate concentration in the culture medium. However, sulfation to form dermatan sulfate was preserved to a greater degree, so that the relative proportion of dermatan sulfate to chondroitin sulfate increased. Essentially all the nonsulfated residues were susceptible to chondroitin AC lyase, indicating that little epimerization of glucuronic acid residues to iduronic acid had occurred in the absence of sulfation. These results confirm the previously described dependency of glucuronic/iduronic epimerization on sulfation, and indicate that sulfation of the iduronic acid-containing disaccharide residues of dermatan can take place with sulfate concentrations lower than those needed for 6-sulfation and 4-sulfation of the glucuronic acid-containing disaccharide residues of chondroitin. There were considerable differences among the six fibroblast lines in susceptibility to low sulfate medium and in the proportion of chondroitin 6-sulfate, chondroitin 4-sulfate, and dermatan sulfate. However, there was no pattern of differences between normals and diabetics